<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1776 to 1790.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-hoot-may-20-2014-bhairav-acharya-legislating-for-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/national-elections-2014-how-technology-powered-campaigns"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/net-neutrality-free-speech-and-the-indian-constitution-2013-iii-conceptions-of-free-speech-and-democracy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/future-of-cyber-governance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/harvard-university-may-13-2014-does-size-matter"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/ecj-rules-internet-search-engine-operator-responsible-for-processing-personal-data-published-by-third-parties"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-hindu-business-line-may-10-2014-sunil-abraham-net-freedom-campaign-loses-its-way"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-times-of-india-may-6-2014-laxmi-ajai-prasanna-civil-society-pushes-for-privacy-panel"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/filtering-content-on-the-internet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/dml-central-april-17-2014-nishant-shah-networks-what-you-dont-see-is-what-you-for-get"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/april-2014-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-embodiment-of-right-to-privacy-within-domestic-legislation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/-neutrality-free-speech-and-the-indian-constitution-part-2"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/dna-amrita-madhukalya-april-26-2014-facebook-launches-fb-newswire-for-journalists-loses-part-of-its-immunity-under-it-act-2000"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-times-of-india-april-25-indrani-bagchi-india-for-inclusive-internet-governance"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-hoot-may-20-2014-bhairav-acharya-legislating-for-privacy">
    <title>Legislating for Privacy - Part II</title>
    <link>https://cis-india.org/internet-governance/blog/the-hoot-may-20-2014-bhairav-acharya-legislating-for-privacy</link>
    <description>
        &lt;b&gt;Apart from the conflation of commercial data protection and privacy, the right to privacy bill has ill-informed and poorly drafted provisions to regulate surveillance.&lt;/b&gt;
        &lt;p&gt;The article was &lt;a class="external-link" href="http://www.thehoot.org/web/freetracker/storynew.php?storyid=570&amp;amp;sectionId=10"&gt;published in the Hoot&lt;/a&gt; on May 20, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Emblem.png" alt="Emblem" class="image-inline" title="Emblem" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;In October 2010, the Department of Personnel and Training ("DOPT") of the Ministry of Personnel, Public Grievances and Pensions released an ‘Approach Paper’ towards drafting a privacy law for India. The Approach Paper claims to be prepared by a leading Indian corporate law firm that, to the best of my knowledge, has almost no experience of criminal procedure or constitutional law. The Approach Paper resulted in the drafting of a Right to Privacy Bill, 2011 ("DOPT Bill") which, although it has suffered several leaks, has neither been published for public feedback nor sent to the Cabinet for political clearance prior to introduction in Parliament.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Approach Paper and DOPT Bill&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The first article in this two-part series broadly examined the many legal facets of privacy. Notions of privacy have long informed law in common law countries and have been statutorily codified to protect bodily privacy, territorial or spatial privacy, locational privacy, and so on. These fields continue to evolve and advance; for instance, the legal imperative to protect intimate body privacy from violation has now expanded to include biometric information, and the protection given to the content of personal communications that developed over the course of the twentieth century is now expanding to encompass metadata and other ‘information about information’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Approach Paper suffers from several serious flaws, the largest of which is its conflation of commercial data protection and privacy. It ignores the diversity of privacy law and jurisprudence in the common law, instead concerning itself wholly with commercial data protection. This creates a false equivalency, albeit not one that cannot be rectified by re-naming the endeavour to describe commercial data protection only.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, there are other errors. The paper claims that no right of action exists for privacy breaches between citizens inter se. This is false, the civil wrongs of nuisance, interference with enjoyment, invasion of privacy, and other similar torts and actionable claims operate to redress privacy violations. In fact, in the case of Ratan Tata v. Union of India that is currently being heard by the Supreme Court of India, at least two parties are arguing that privacy is already adequately protected by civil law. Further, the criminal offences of nuisance and defamation, amongst others, and the recently introduced crimes of stalking and voyeurism, all create rights of action for privacy violations. These measures are incomplete, – this is not contested, the premise of these articles is the need for better privacy protection law – but denying their existence is not useful.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The shortcomings of the Approach Paper are reflected in the draft legislation it resulted in. A major concern with the DOPT Bill is its amateur treatment of surveillance and interception of communications. This is inevitable for the Approach Paper does not consider this area at all although there is sustained and critical global and national attention to the issues that attend surveillance and communications privacy. For an effort to propose privacy law, this lapse is quite astonishing. The Approach Paper does not even examine if Parliament is competent to regulate surveillance, although the DOPT Bill wades into this contested turf.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Constitutionality of Interceptions&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In a federal country, laws are weighed by the competence of their legislatures and struck down for overstepping their bounds. In India, the powers to legislate arise from entries that are contained in three lists in Schedule VII of the Constitution. The power to legislate in respect of intercepting communications traditionally emanates from Entry 31 of the Union List, which vests the Union – that is, Parliament and the Central Government – with the power to regulate “Posts and telegraphs; telephones, wireless, broadcasting and other like forms of communication” to the exclusion of the States. Hence, the Indian Telegraph Act, 1885, and the Indian Post Office Act, 1898, both Union laws, contain interception provisions. However, after holding the field for more than a century, the Supreme Court overturned this scheme in Bharat Shah’s case in 2008.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The case challenged the telephone interception provisions of the Maharashtra Control of Organised Crime Act, 1999 ("MCOCA"), a State law that appeared to transgress into legislative territory reserved for the Union. The Supreme Court held that Maharashtra’s interception provisions were valid and arose from powers granted to the States – that is, State Assemblies and State Governments – by Entries 1 and 2 of the State List, which deal with “public order” and “police” respectively. This cleared the way for several States to frame their own communications interception regimes in addition to Parliament’s existing laws. The question of what happens when the two regimes clash has not been answered yet. India’s federal scheme anticipates competing inconsistencies between Union and State laws, but only when these laws derive from the Concurrent List which shares legislative power. In such an event, the ‘doctrine of repugnancy’ privileges the Union law and strikes down the State law to the extent of the inconsistency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In competitions between Union and State laws that do not arise from the Concurrent List but instead from the mutually exclusive Union and State Lists, the ‘doctrine of pith and substance’ tests the core substance of the law and traces it to one the two Lists. Hence, in a conflict, a Union law the substance of which was traceable to an entry in the State List would be struck down, and vice versa.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the doctrine permits incidental interferences that are not substantive. For example, as in a landmark 1946 case, a State law validly regulating moneylenders may incidentally deal with promissory notes, a Union field, since the interference is not substantive. Since surveillance is a police activity, and since “police” is a State subject, care must be taken by a Union surveillance law to remain on the pale of constitutionality by only incidentally affecting police procedure. Conversely, State surveillance laws were required to stay clear of the Union’s exclusive interception power until Bharat Shah’s case dissolved this distinction without answering the many questions it threw up.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since the creation of the Republic, India’s federal scheme was premised on the notion that the Union and State Lists were exclusive of each other. Conceptually, the Union and the States could not have competing laws on the same subject. But Bharat Shah did just that; it located the interception power in both the Lists and did not enunciate a new doctrine to resolve their (inevitable) future conflict. This both disturbs Indian constitutional law and goes to the heart of surveillance and privacy law.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Three Principles of Interception&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Apart from the important questions regarding legislative competence and constitutionality, the DOPT Bill proposed weak, ill-informed, and poorly drafted provisions to regulate surveillance and interceptions. It serves no purpose to further scrutinise the 2011 DOPT Bill. Instead, at this point, it may be constructive to set out the broad contours of a good interceptions regulation regime. Some clarity on the concepts: intercepting communications means capturing the content and metadata of oral and written communications, including letters, couriers, telephone calls, facsimiles, SMSs, internet telephony, wireless broadcasts, emails, and so on. It does not include activities such visual capturing of images, location tracking or physical surveillance; these are separate aspects of surveillance, of which interception of communications is a part.&lt;br /&gt; &lt;br /&gt;&lt;span style="text-decoration: underline;"&gt;Firstly&lt;/span&gt;, all interceptions of communications must be properly sanctioned. In India, under Rule 419A of the Indian Telegraph Rules, 1951, the Home Secretary – an unelected career bureaucrat, or a junior officer deputised by the Home Secretary – with even lesser accountability, authorises interceptions. In certain circumstances, even senior police officers can authorise interceptions. Copies of the interception orders are supposed to be sent to a Review Committee, consisting of three more unelected bureaucrats, for bi-monthly review. No public information exists, despite exhaustive searching, regarding the authorisers and numbers of interception orders and the appropriateness of the interceptions.&lt;br /&gt; &lt;br /&gt;The Indian system derives from outdated United Kingdom law that also enables executive authorities to order interceptions. But, the UK has constantly revisited and revised its interception regime; its present avatar is governed by the Regulation of Investigatory Powers Act, 2000 ("RIPA") which creates a significant oversight mechanism headed by an independent commissioner, who monitors interceptions and whose reports are tabled in Parliament, and quasi-judicially scrutinised by a tribunal comprised of judges and senior independent lawyers, which hears public complaints, cancels interceptions, and awards monetary compensation. Put together, even though the current UK interceptions system is executively sanctioned, it is balanced by independent and transparent quasi-judicial authorities.&lt;br /&gt; &lt;br /&gt;In the United States, all interceptions are judicially sanctioned because American constitutional philosophy – the separation of powers doctrine – requires state action to be checked and balanced. Hence, ordinary interceptions of criminals’ communications as also extraordinary interceptions of perceived national security threats are authorised only by judges, who are ex hypothesi independent, although, as the PRISM affairs teaches us, independence can be subverted. In comparison, India’s interception regime is incompatible with its democracy and must be overhauled to establish independent and transparent authorities to properly sanction interceptions.&lt;br /&gt; &lt;br /&gt;&lt;span style="text-decoration: underline;"&gt;Secondly&lt;/span&gt;, no interceptions should be sanctioned but upon ‘probable cause’. Simply described, probable cause is the standard that convinces a reasonable person of the existence of criminality necessary to warrant interception. Probable case is an American doctrine that flows from the US Constitution’s Fourth Amendment that protects the rights of people to be secure in places in which they have a reasonable expectation of privacy. There is no equivalent standard in UK law, except perhaps the common law test of reasonability that attaches to all government action that abridges individual freedoms. If a coherent ‘reasonable suspicion’ test could be coalesced from the common law, I think it would fall short of the strictness that the probable cause doctrine imposes on the executive. Therefore, the probable cause requirement is stronger than ordinary constraint of reasonability but weaker than the standard of reasonable doubt beyond which courts may convict. In this spectrum of acceptable standards, India’s current law in section 5(2) of the Indian Telegraph Act, 1885 is the weakest for it permits interceptions merely “on the occurrence of any public emergency or in the interest of public safety”, which determination is left to the “satisfaction” of a bureaucrat. And, under Rule 419A(2) of the Telegraph Rules, the only imposition on the bureaucrat when exercising this satisfaction is that the order “contain reasons” for the interception.&lt;br /&gt; &lt;br /&gt;&lt;span style="text-decoration: underline;"&gt;Thirdly&lt;/span&gt;, all interceptions should be warranted. This point refers not to the necessity or otherwise of the interception, but to the framework within which it should be conducted. Warrants should clearly specify the name and clear identity of the person whose communications are sought to be intercepted. The target person’s identity should be linked to the specific means of communication upon which the suspected criminal conversations take place. Therefore, if the warrant lists one person’s name but another person’s telephone number – which, because of the general ineptness of many police forces, is not uncommon – the warrant should be rejected and the interception cancelled. And, by extension, the specific telephone number, or email account, should be specified. A warrant against a person called Rahul Kumar, for instance, cannot be executed against all Rahul Kumars in the vicinity, nor also against all the telephones that the one specific Rahul Kumar uses, but only against the one specific telephone number that is used by the one specific Rahul Kumar. Warrants should also specify the duration of the interception, the officer responsible for its conduct and thereby liable for its abuse, and other safeguards. Some of these concerns were addressed in 2007 when the Telegraph Rules were amended, but not all.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A law that fails to substantially meet the standards of these principles is liable, perhaps in the not too distant future, to be read down or struck down by India’s higher judiciary. But, besides the threat of judicial review, a democratic polity must protect the freedoms and diversity of its citizens by holding itself to the highest standards of the rule of law, where the law is just.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-hoot-may-20-2014-bhairav-acharya-legislating-for-privacy'&gt;https://cis-india.org/internet-governance/blog/the-hoot-may-20-2014-bhairav-acharya-legislating-for-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-05-28T09:59:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/national-elections-2014-how-technology-powered-campaigns">
    <title>National Elections 2014: How Technology Powered Campaigns</title>
    <link>https://cis-india.org/events/national-elections-2014-how-technology-powered-campaigns</link>
    <description>
        &lt;b&gt;HasGeek and the Centre for Internet and Society (CIS) welcome you to a presentation on how technology powered politicial campaigns in the recently concluded 2014 national elections. Developers, advocacy organizations and the general public are invited to participate. The event will be held at CIS on May 23, 2014, 6.00 p.m. to 8.30 p.m.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;During the 2014 Indian general elections, technology was widely used for candidate and party campaigns. The purpose of these technology-driven campaigns was to help voters make more informed decisions before casting their votes. Voter responses to these campaigns continuously helped individual candidates and political parties (via their technology teams and consultants) to rework messaging till the very end.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;HasGeek and CIS are organizing three presentations followed by an interactive Q&amp;amp;A session to understand how technology spurred campaigns during the 2014 elections, and how voters will have to get smarter just as parties are becoming smart in reaching out to them.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Sessions&lt;/h2&gt;
&lt;h3&gt;Campaigning in the pre-Internet and Internet Era (Talk)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Vijay Grover, founder of Bangalore Media Foundation and television journalist since 17 years, will compare the past and present to explain how internet technologies have changed campaigning stratgies. Grover will argue that voters need to get smart in sifting information and making choices as more and more parties use social media and information technologies in reaching out to them.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Technology-driven campaigns (Talk)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Viral Shah, part of Nandan Nilekani's campaign management team, will talk about how India is placed in the global scene with respect to technology-driven political campaigns. Viral will also discuss how to design a campaign with technology and how technology was used to power Nilekani's campaign.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Tools used for powering campaigns and attracting volunteers (Talk)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;BG Mahesh, founder and managing director at Oneindia.in, will talk about the tools used during Narendra Modi's campaign. Apart from informing voters about the candidate, volunteers were also enlisted through the drives. BG Mahesh will throw light on how technology made this possible.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Schedule&lt;/h2&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Time&lt;/th&gt;&lt;th&gt;Sessions&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;18.00&lt;br /&gt;18.15&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;Introductions: HasGeek, CIS, The Fifth Elephant &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;18.15&lt;br /&gt;18.45&lt;/td&gt;
&lt;td&gt;Vijay Grover: Campaigning in the pre-Internet and Internet Era&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;18.45&lt;br /&gt;19.15&lt;/td&gt;
&lt;td&gt;Viral Shah: Technology-driven campaigning&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;19.15&lt;br /&gt;19.45&lt;/td&gt;
&lt;td&gt;B.G.Mahesh: Tools used for powering campaigns and attracting volunteers&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;19.45&lt;br /&gt;20.15&lt;/td&gt;
&lt;td&gt;Q &amp;amp; A Session&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;20.15&lt;br /&gt;20.30&lt;/td&gt;
&lt;td&gt;Snacks&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/national-elections-2014-how-technology-powered-campaigns'&gt;https://cis-india.org/events/national-elections-2014-how-technology-powered-campaigns&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-05-20T07:03:51Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/net-neutrality-free-speech-and-the-indian-constitution-2013-iii-conceptions-of-free-speech-and-democracy">
    <title>Net Neutrality, Free Speech and the Indian Constitution – III: Conceptions of Free Speech and Democracy</title>
    <link>https://cis-india.org/internet-governance/blog/net-neutrality-free-speech-and-the-indian-constitution-2013-iii-conceptions-of-free-speech-and-democracy</link>
    <description>
        &lt;b&gt;In this 3 part series, Gautam Bhatia explores the concept of net neutrality in the context of Indian law and the Indian Constitution.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In the modern State, effective exercise of free speech rights is increasingly dependent upon an infrastructure that includes newspapers, television and the internet. Access to a significant part of this infrastructure is determined by money. Consequently, if what we value about free speech is the ability to communicate one’s message to a non-trivial audience, financial resources influence both &lt;i&gt;who &lt;/i&gt;can speak and, consequently, &lt;i&gt;what &lt;/i&gt;is spoken. The nature of the public discourse – what information and what ideas circulate in the public sphere – is contingent upon a distribution of resources that is arguably unjust and certainly unequal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are two opposing theories about how we should understand the right to free speech in this context. Call the first one of these the libertarian conception of free speech. The libertarian conception takes as given the existing distribution of income and resources, and consequently, the unequal speaking power that that engenders. It prohibits any intervention designed to remedy the situation. The most famous summary of this vision was provided by the American Supreme Court, when it first struck down campaign finance regulations, in &lt;a href="http://www.law.cornell.edu/supremecourt/text/424/1#writing-USSC_CR_0424_0001_ZO"&gt;&lt;i&gt;Buckley v. Valeo&lt;/i&gt;&lt;/a&gt;: &lt;i&gt;“t&lt;/i&gt;&lt;i&gt;he concept that government may restrict the speech of some [in] order to enhance the relative voice of others is wholly foreign to the First Amendment.” &lt;/i&gt;This theory is part of the broader libertarian worldview, which would restrict government’s role in a polity to enforcing property and criminal law, and views any government-imposed restriction on what people can do within the existing structure of these laws as presumptively wrong.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;We can tentatively label the second theory as the &lt;i&gt;social-democratic theory &lt;/i&gt;of free speech. This theory focuses not so much on the individual speaker’s right not to be restricted in using their resources to speak as much as they want, but upon the collective interest in maintaining a public discourse that is open, inclusive and home to a multiplicity of diverse and antagonistic ideas and viewpoints. Often, in order to achieve this goal, governments regulate access to the infrastructure of speech so as to ensure that participation is not entirely skewed by inequality in resources. When this is done, it is often justified in the name of democracy: a functioning democracy, it is argued, requires a thriving public sphere that is not closed off to some or most persons.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Surprisingly, one of the most powerful judicial statements for this vision also comes from the United States. In &lt;a href="http://supreme.justia.com/cases/federal/us/395/367/case.html"&gt;&lt;i&gt;Red Lion v. FCC&lt;/i&gt;&lt;/a&gt;, while upholding the “fairness doctrine”, which required broadcasting stations to cover “both sides” of a political issue, and provide a right of reply in case of personal attacks, the Supreme Court noted:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“[Free speech requires] &lt;i&gt;preserv&lt;/i&gt;[ing]&lt;i&gt; an uninhibited marketplace of ideas in which truth will ultimately prevail, rather than to countenance &lt;span style="text-decoration: underline;"&gt;monopolization of that market&lt;/span&gt;, whether it be by the Government itself or &lt;span style="text-decoration: underline;"&gt;a private licensee&lt;/span&gt;…&lt;/i&gt;&lt;i&gt; it is the right of the public to receive suitable access to social, political, esthetic, moral, and other ideas and experiences which is crucial here&lt;/i&gt;.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What of India? In the early days of the Supreme Court, it adopted something akin to the libertarian theory of free speech. In &lt;a href="http://indiankanoon.org/doc/243002/"&gt;&lt;i&gt;Sakal Papers v. Union of India&lt;/i&gt;&lt;/a&gt;, for example, it struck down certain newspaper regulations that the government was defending on grounds of opening up the market and allowing smaller players to compete, holding that Article 19(1)(a) – in language similar to what &lt;i&gt;Buckley v. Valeo &lt;/i&gt;would hold, more than fifteen years later – did not permit the government to infringe the free speech rights of some in order to allow others to speak. The Court continued with this approach in its next major newspaper regulation case, &lt;a href="http://www.indiankanoon.org/doc/125596/"&gt;&lt;i&gt;Bennett Coleman v. Union of India&lt;/i&gt;&lt;/a&gt;, but this time, it had to contend with a strong dissent from Justice Mathew. After noting that “&lt;i&gt;it is no use having a right to express your idea, unless you have got a medium for expressing it”&lt;/i&gt;, Justice Mathew went on to hold:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;i&gt;What is, therefore, required is an interpretation of Article 19(1)(a) which focuses on the idea that restraining the hand of the government is quite useless in assuring free speech, if a restraint on access is effectively secured by private groups. A Constitutional prohibition against governmental restriction on the expression is effective only if the Constitution ensures an adequate opportunity for discussion… Any scheme of distribution of newsprint which would make the freedom of speech a reality by making it possible the dissemination of ideas as news with as many different facets and colours as possible would not violate the fundamental right of the freedom of speech of the petitioners. In other words, a scheme for distribution of a commodity like newsprint which will subserve the purpose of free flow of ideas to the market from as many different sources as possible would be a step to advance and enrich that freedom. If the scheme of distribution is calculated to prevent even an oligopoly ruling the market and thus check the tendency to monopoly in the market, that will not be open to any objection on the ground that the scheme involves a regulation of the press which would amount to an abridgment of the freedom of speech.&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;In Justice Mathew’s view, therefore, freedom of speech is not only the speaker’s right (the libertarian view), but a complex balancing act between the listeners’ right to be exposed to a wide range of material, as well as the collective, societal right to have an open and inclusive public discourse, which can only be achieved by preventing the monopolization of the instruments, infrastructure and access-points of speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Over the years, the Court has moved away from the majority opinions in &lt;i&gt;Sakal Papers &lt;/i&gt;and &lt;i&gt;Bennett Coleman&lt;/i&gt;, and steadily come around to Justice Mathew’s view. This is particularly evident from two cases in the 1990s: in &lt;a href="http://indiankanoon.org/doc/921638/"&gt;&lt;i&gt;Union of India v. The Motion Picture Association&lt;/i&gt;&lt;/a&gt;, the Court upheld various provisions of the Cinematograph Act that imposed certain forms of compelled speech on moviemakers while exhibiting their movies, on the ground that “&lt;i&gt;to earmark a small portion of time of this entertainment medium for the purpose of showing scientific, educational or documentary films, or for showing news films has to be looked at in this context of &lt;/i&gt;&lt;i&gt;&lt;span style="text-decoration: underline;"&gt;promoting dissemination of ideas, information and knowledge to the masses so that there may be an informed debate and decision making on public issues&lt;/span&gt;&lt;/i&gt;&lt;i&gt;. Clearly, the impugned provisions are designed to further free speech and expression and not to curtail it.&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.indiankanoon.org/doc/304068/"&gt;&lt;i&gt;LIC v. Manubhai D. Shah&lt;/i&gt;&lt;/a&gt; is even more on point. In that case, the Court upheld a right of reply in an &lt;i&gt;in-house &lt;/i&gt;magazine, &lt;i&gt;“because fairness demanded that both view points were placed before the readers,&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;&lt;span style="text-decoration: underline;"&gt;however limited be their number, to enable them to draw their own conclusions and unreasonable&lt;/span&gt;&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;because there was no logic or proper justification for refusing publication…&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;the respondent’s fundamental right of speech and expression clearly entitled him to insist that his views on the subject should reach those who read the magazine so that they have a complete picture before them and not a one sided or distorted one&lt;/i&gt;…” This goes even further than Justice Mathew’s dissent in &lt;i&gt;Bennett Coleman&lt;/i&gt;, and the opinion of the Court in &lt;i&gt;Motion Picture Association&lt;/i&gt;, in holding that not merely is it permitted to structure the public sphere in an equal and inclusive manner, but that it is a &lt;i&gt;requirement &lt;/i&gt;of Article 19(1)(a).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We can now bring the threads of the separate arguments in the three posts together. In the first post, we found that public law and constitutional obligations can be imposed upon private parties when they discharge public functions. In the second post, it was argued that the internet has replaced the park, the street and the public square as the quintessential forum for the circulation of speech. ISPs, in their role as gatekeepers, now play the role that government once did in controlling and keeping open these avenues of expression. Consequently, they can be subjected to public law free speech obligations. And lastly, we discussed how the constitutional conception of free speech in India, that the Court has gradually evolved over many years, is a social-democratic one, that requires the keeping open of a free and inclusive public sphere. &lt;a href="http://motherboard.vice.com/read/net-neutrality-monopoly-and-the-death-of-the-democratic-internet?trk_source=homepage-lede"&gt;And if there is one thing that fast-lanes over the internet threaten, it is certainly a free and inclusive (digital) public sphere&lt;/a&gt;. A combination of these arguments provides us with an arguable case for imposing obligations of net neutrality upon ISPs, even in the absence of a statutory or regulatory obligations, grounded within the constitutional guarantee of the freedom of speech and expression.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;For the previous post, please see: http://cis-india.org/internet-governance/blog/-neutrality-free-speech-and-the-indian-constitution-part-2.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;_____________________________________________________________________________________________________&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;i style="text-align: justify; "&gt;Gautam Bhatia — @gautambhatia88 on Twitter — is a graduate of the National Law School of India University (2011), and presently an LLM student at the Yale Law School. He blogs about the Indian Constitution at &lt;a class="moz-txt-link-freetext" href="http://indconlawphil.wordpress.com/"&gt;http://indconlawphil.wordpress.com&lt;/a&gt;. Here at CIS, he will be blogging on issues of online freedom of speech and expression.&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/net-neutrality-free-speech-and-the-indian-constitution-2013-iii-conceptions-of-free-speech-and-democracy'&gt;https://cis-india.org/internet-governance/blog/net-neutrality-free-speech-and-the-indian-constitution-2013-iii-conceptions-of-free-speech-and-democracy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>gautam</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-05-27T10:21:24Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/future-of-cyber-governance">
    <title>The Future of Cyber Governance </title>
    <link>https://cis-india.org/news/future-of-cyber-governance</link>
    <description>
        &lt;b&gt;Hague Institute for Global Justice in association with the Observer Research Foundation, Ministry of Foreign Affairs of Netherlands, and the Netherlands Institute for International Relations - Clingendael organized a conference on the Future of Cyber Governance at the Hague from May 13 to 15, 2014. Sunil Abraham was a speaker at this event.&lt;/b&gt;
        &lt;h2 style="text-align: justify; "&gt;Global Governance Reform Initiative&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Global Governance Reform Initiative (GGRI) seeks to overcome the challenges of global governance in three important domains – cyberspace, oceans and migration – by improving the efficiency, effectiveness and legitimacy of collective actions undertaken by relevant stakeholders.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The current focus of the GGRI is the governance of cyberspace. How cyberspace is governed has significant implications for a range of critical issues, from national security to the protection of individuals’ rights and freedoms. Yet, the governance of cyberspace is highly contested. Tensions exist between those who favour private sector-led, decentralized forms of governance, and those who favour state-led, centralized forms of governance. There is, therefore, a pressing need for practicable policies which can help balance competing demands effectively.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The conference is a platform for 17 outstanding academics and professionals representing a range of countries and sectors to present papers addressing key issues related to the governance of cyberspace. The authors were selected through a competitive application process which sought to balance the candidates’ professional and geographic backgrounds in a manner that would maximize the quality and policy-relevance of the research.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During the conference, the participants will present their papers to a select group of seasoned experts on cyber governance. These experts will provide the participants with constructive feedback on their research findings and policy recommendations. The aim of the conference is to allow the participants to engage in a rigorous analysis of the selected governance challenges in order to craft practicable policy recommendations aimed at improving the governance of cyberspace. The authors of the best papers will be invited to present their work at the 2014 India Conference on Cyber Security and Cyber Governance, organized by the Observer Research Foundation, New Delhi.&lt;br /&gt;The Hague Institute undertakes this project in collaboration with the Netherlands Ministry of Foreign Affairs, the Observer Research Foundation (New Delhi), and the Netherlands Institute of International Relations – Clingendael.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;See the &lt;a href="https://cis-india.org/internet-governance/blog/global-governance-reform-initiative.pdf" class="internal-link"&gt;full details of the programme here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Video&lt;/h2&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/dblYECIVHs8" width="360"&gt;&lt;/iframe&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/future-of-cyber-governance'&gt;https://cis-india.org/news/future-of-cyber-governance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-05-27T10:05:43Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/harvard-university-may-13-2014-does-size-matter">
    <title>Does Size Matter? A Tale of Performing Welfare, Producing Bodies and Faking Identity</title>
    <link>https://cis-india.org/news/harvard-university-may-13-2014-does-size-matter</link>
    <description>
        &lt;b&gt;Malavika Jayaram gave a talk.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cyber.law.harvard.edu/events/luncheon/2014/05/jayaram"&gt;This was published by the website of Berkman Center for Internet and Society&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Big Data doesn’t get much bigger than India’s identity project. The world’s largest biometric database - currently consisting of almost 600 million enrolled - seduces with promises of inclusion, legitimacy and visibility. By locating this techno-utopian vision within the larger surveillance state that a unique identifier facilitates, Malavika will describe the ‘welfare industrial complex’ that imagines the poor as the next emerging market. She will highlight the risks of the body as password, of implementing e-governance in a legal vacuum, and of digitization reinforcing existing inequalities. The export of technologies of control - once they have been tested on a massive population that has little agency and limited ability to withhold consent - transforms this project from a site of local activism to one with global repercussions. By offering a perspective that is somewhat different from the traditional western focus of privacy, she hopes to generate a more inclusive discourse about what it means to be autonomous and empowered in the face of paternalistic development projects. She will highlight, in particular, the varied ways in which the project is already being subverted and re-purposed, in ways that are humorous and poignant.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;About Malavika&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Malavika is a Fellow at the Berkman Center for Internet and Society at  Harvard University, focusing on privacy, identity and free expression.  She is also a Fellow at the Centre for Internet and Society, Bangalore,  and the author of the India chapter for the Data Protection &amp;amp;  Privacy volume in the Getting the Deal Done series. Malavika is one of  10 Indian lawyers in The International Who's Who of Internet e-Commerce  &amp;amp; Data Protection Lawyers directory. In August 2013, she was voted  one of India’s leading lawyers - one of only 8 women to be featured in  the “40 under 45” survey conducted by Law Business Research, London. In a  different life, she spent 8 years in London, practicing law with global  firm Allen &amp;amp; Overy in the Communications, Media &amp;amp; Technology  group, and as VP and Technology Counsel at Citigroup. She is working on a  PhD about the development of a privacy jurisprudence and discourse in  India, viewed partly through the lens of the Indian biometric ID  project.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Podcast&lt;/h3&gt;
&lt;p&gt;Watch the podcast &lt;a class="external-link" href="http://castroller.com/podcasts/BerkmanCenterFor/4060529"&gt;at this link&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/harvard-university-may-13-2014-does-size-matter'&gt;https://cis-india.org/news/harvard-university-may-13-2014-does-size-matter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-06-04T09:45:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/ecj-rules-internet-search-engine-operator-responsible-for-processing-personal-data-published-by-third-parties">
    <title>European Court of Justice rules Internet Search Engine Operator responsible for Processing Personal Data Published by Third Parties</title>
    <link>https://cis-india.org/internet-governance/blog/ecj-rules-internet-search-engine-operator-responsible-for-processing-personal-data-published-by-third-parties</link>
    <description>
        &lt;b&gt;The Court of Justice of the European Union has ruled that an "an internet search engine operator is responsible for the processing that it carries out of personal data which appear on web pages published by third parties.” The decision adds to the conundrum of maintaining a balance between freedom of expression, protecting personal data and intermediary liability.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The ruling is expected to have considerable impact on reputation and privacy related takedown requests as under the decision, data subjects may approach the operator directly seeking removal of links to web pages containing personal data. Currently, users prove whether data needs to be kept online—the new rules reverse the burden of proof, placing an obligation on companies, rather than users for content regulation.&lt;/p&gt;
&lt;h3&gt;A win for privacy?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The ECJ ruling addresses Mario Costeja González complaint filed in 2010, against Google Spain and Google Inc., requesting that personal data relating to him appearing in search results be protected and that data which was no longer relevant be removed. Referring to &lt;a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:en:HTML"&gt;the Directive 95/46/EC&lt;/a&gt; of the European Parliament, the court said, that Google and other search engine operators should be considered 'controllers' of personal data. Following the decision, Google will be required to consider takedown requests of personal data, regardless of the fact that processing of such data is carried out without distinction in respect of information other than the personal data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The decision—which cannot be appealed—raises important of questions of how this ruling will be applied in practice and its impact on the information available online in countries outside the European Union.  The decree forces search engine operators such as Google, Yahoo and Microsoft's Bing to make judgement calls on the fairness of the information published through their services that reach over 500  million people across the twenty eight nation bloc of EU.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ECJ rules that search engines 'as a general rule,' should place the right to privacy above the right to information by the public. Under the verdict, links to irrelevant and out of date data need to be erased upon request, placing search engines in the role of controllers of information—beyond the role of being an arbitrator that linked to data that already existed in the public domain. The verdict is directed at highlighting the power of search engines to retrieve controversial information while limiting their capacity to do so in the future.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ruling calls for maintaining a balance in addressing the legitimate interest of internet users in accessing personal information and upholding the data subject’s fundamental rights, but does not directly address either issues. The court also recognised, that the data subject's rights override the interest of internet users, however, with exceptions pertaining to nature of information, its sensitivity for the data subject's private life and the role of the data subject in public life. Acknowledging that data belongs to the individual and is not the right of the company, European Commissioner Viviane Reding, &lt;a href="https://www.facebook.com/permalink.php?story_fbid=304206613078842&amp;amp;id=291423897690447&amp;amp;_ga=1.233872279.883261846.1397148393"&gt;hailed the verdict&lt;/a&gt;, "a clear victory for the protection of personal data of Europeans".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Court stated that if data is deemed irrelevant at the time of the case, even if it has been lawfully processed initially, it must be removed and that the data subject has the right to approach the operator directly for the removal of such content. The liability issue is further complicated by the fact, that search engines such as Google do not publish the content rather they point to information that already exists in the public domain—raising questions of the degree of liability on account of third party content displayed on their services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ECJ ruling is based on the case originally filed against Google, Spain and it is important to note that, González argued that searching for his name linked to two pages originally published in 1998, on the website of the Spanish newspaper La Vanguardia. The Spanish Data Protection Agency did not require La Vanguardia to take down the pages, however, it did order Google to remove links to them. Google appealed this decision, following which the National  High Court of Spain sought advice from the European court. The definition of Google as the controller of information, raises important questions related to the distinction between liability of publishers and the liability of processors of information such as search engines.&lt;/p&gt;
&lt;h3&gt;The 'right to be forgotten'&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The decision also brings to the fore, the ongoing debate and &lt;a href="http://www.theguardian.com/technology/2013/apr/04/britain-opt-out-right-to-be-forgotten-law"&gt;fragmented opinions within the EU&lt;/a&gt;, on the right of the individual to be forgotten. The &lt;a href="http://www.bbc.com/news/technology-16677370"&gt;'right to be forgotten&lt;/a&gt;' has evolved from the European Commission's wide-ranging plans of an overhaul of the commission's 1995 Data Protection Directive. The plans for the law included allowing people to request removal of personal data with an obligation of compliance for service providers, unless there were 'legitimate' reasons to do otherwise. Technology firms rallying around issues of freedom of expression and censorship, have expressed concerns about the reach of the bill. Privacy-rights activist and European officials have upheld the notion of the right to be forgotten, highlighting the right of the individual to protect their honour and reputation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These issues have been controversial amidst EU member states with the UK's Ministry of Justice claiming the law 'raises unrealistic and unfair expectations' and  has &lt;a href="http://www.theguardian.com/technology/2013/apr/04/britain-opt-out-right-to-be-forgotten-law"&gt;sought to opt-out&lt;/a&gt; of the privacy laws. The Advocate General of the European Court &lt;a href="http://curia.europa.eu/juris/document/document.jsf?text=&amp;amp;docid=138782&amp;amp;pageIndex=0&amp;amp;doclang=EN&amp;amp;mode=req&amp;amp;dir=&amp;amp;occ=first&amp;amp;part=1&amp;amp;cid=362663#Footref91"&gt;Niilo Jääskinen's opinion&lt;/a&gt;, that the individual's right to seek removal of content should not be upheld if the information was published legally, contradicts the verdict of the ECJ ruling. The European Court of Justice's move is surprising for many and as Richard Cumbley, information-management and data protection partner at the law firm Linklaters &lt;a href="http://turnstylenews.com/2014/05/13/europe-union-high-court-establishes-the-right-to-be-forgotten/"&gt;puts it&lt;/a&gt;, “Given that the E.U. has spent two years debating this right as part of the reform of E.U. privacy legislation, it is ironic that the E.C.J. has found it already exists in such a striking manner."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The economic implications of enforcing a liability regime where search engine operators censor legal content in their results aside, the decision might also have a chilling effect on freedom of expression and access to information. Google &lt;a href="http://www.theguardian.com/technology/2014/may/13/right-to-be-forgotten-eu-court-google-search-results"&gt;called the decision&lt;/a&gt; “a disappointing ruling for search engines and online publishers in general,” and that the company would take time to analyze the implications. While the implications of the decision are yet to be determined, it is important to bear in mind that while decisions like these are public, the refinements that Google and other search engines will have to make to its technology and the judgement calls on the fairness of the information available online are not public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ECJ press release is available &lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2014-05/cp140070en.pdf"&gt;here&lt;/a&gt; and the actual judgement is available &lt;a href="http://curia.europa.eu/juris/documents.jsf?pro=&amp;amp;lgrec=en&amp;amp;nat=or&amp;amp;oqp=&amp;amp;lg=&amp;amp;dates=&amp;amp;language=en&amp;amp;jur=C%2CT%2CF&amp;amp;cit=none%252CC%252CCJ%252CR%252C2008E%252C%252C%252C%252C%252C%252C%252C%252C%252C%252Ctrue%252Cfalse%252Cfalse&amp;amp;num=C-131%252F12&amp;amp;td=%3BALL&amp;amp;pcs=Oor&amp;amp;avg"&gt;here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/ecj-rules-internet-search-engine-operator-responsible-for-processing-personal-data-published-by-third-parties'&gt;https://cis-india.org/internet-governance/blog/ecj-rules-internet-search-engine-operator-responsible-for-processing-personal-data-published-by-third-parties&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    

   <dc:date>2014-05-14T14:18:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-hindu-business-line-may-10-2014-sunil-abraham-net-freedom-campaign-loses-its-way">
    <title>Net Freedom Campaign Loses its Way</title>
    <link>https://cis-india.org/internet-governance/blog/the-hindu-business-line-may-10-2014-sunil-abraham-net-freedom-campaign-loses-its-way</link>
    <description>
        &lt;b&gt;A recent global meet was a victory for governments and the private sector over civil society interests.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.thehindubusinessline.com/todays-paper/tp-opinion/net-freedom-campaign-loses-its-way/article5994906.ece"&gt;published in the Hindu Businessline&lt;/a&gt; on May 10, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;One word to describe NetMundial: Disappointing! Why? Because despite the promise, human rights on the Internet are still insufficiently protected. Snowden’s revelations starting last June threw the global Internet governance processes into crisis.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Things came to a head in October, when Brazil’s President Dilma Rousseff, horrified to learn that she was under NSA surveillance for economic reasons, called for the organisation of a global conference called NetMundial to accelerate Internet governance reform.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The NetMundial was held in São Paulo on April 23-24 this year. The result was a statement described as “the non-binding outcome of a bottom-up, open, and participatory process involving … governments, private sector, civil society, technical community, and academia from around the world.” In other words — it is international soft law with no enforcement mechanisms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The statement emerges from “broad consensus”, meaning governments such as India, Cuba and Russia and civil society representatives expressed deep dissatisfaction at the closing plenary. Unlike an international binding law, only time will tell whether each member of the different stakeholder groups will regulate itself.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Again, not easy, because the outcome document does not specifically prescribe what each stakeholder can or cannot do — it only says what internet governance (IG) should or should not be. And finally, there’s no global consensus yet on the scope of IG. The substantive consensus was disappointing in four important ways:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Mass surveillance&lt;/b&gt; : Civil society was hoping that the statement would make mass surveillance illegal. After all, global violation of the right to privacy by the US was the &lt;i&gt;raison d'être&lt;/i&gt; of the conference.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Instead, the statement legitimised “mass surveillance, interception and collection” as long as it was done in compliance with international human rights law. This was clearly the most disastrous outcome.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Access to knowledge:&lt;/b&gt; The conference was not supposed to expand intellectual property rights (IPR) or enforcement of these rights. After all, a multilateral forum, WIPO, was meant to address these concerns. But in the days before the conference the rights-holders lobby went into overdrive and civil society was caught unprepared.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The end result — “freedom of information and access to information” or right to information in India was qualified “with rights of authors and creators”. The right to information laws across the world, including in India, contains almost a dozen exemptions, including IPR. The only thing to be grateful for is that this limitation did not find its way into the language for freedom of expression.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Intermediary liability:&lt;/b&gt; The language that limits liability for intermediaries basically provides for a private censorship regime without judicial oversight, and without explicit language protecting the rights to freedom of expression and privacy. Even though the private sector chants Hillary Clinton's Internet freedom mantra — they only care for their own bottomlines.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Net neutrality:&lt;/b&gt; Even though there was little global consensus, some optimistic sections of civil society were hoping that domestic best practice on network neutrality in Brazil’s Internet Bill of Right — also known as Marco Civil, that was signed into law during the inaugural ceremony of NetMundial — would make it to the statement. Unfortunately, this did not happen.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For almost a decade since the debate between the multi-stakeholder and multilateral model started, the multi-stakeholder model had produced absolutely nothing outside ICANN (Internet Corporation for Assigned Names and Numbers, a non-profit body), its technical fraternity and the standard-setting bodies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The multi-stakeholder model is governance with the participation (and consent — depending on who you ask) of those stakeholders who are governed. In contrast, in the multilateral system, participation is limited to nation-states.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Civil society divisions&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The inability of multi-stakeholderism to deliver also resulted in the fragmentation of global civil society regulars at Internet Governance Forums.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But in the run-up to NetMundial more divisions began to appear. If we ignore nuances — we could divide them into three groups. One, the ‘outsiders’ who are best exemplified by Jérémie Zimmermann of the La Quadrature du Net. Jérémie ran an online campaign, organised a protest during the conference and did everything he could to prevent NetMundial from being sanctified by civil society consensus.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Two, the ‘process geeks’ — for these individuals and organisations process was more important than principles. Most of them were as deeply invested in the multi-stakeholder model as ICANN and the US government and some who have been riding the ICANN gravy train for years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even worse, some were suspected of being astroturfers bootstrapped by the private sector and the technical community. None of them were willing to rock the boat. For the ‘process geeks’, seeing politicians and bureaucrats queue up like civil society to speak at the mike was the crowning achievement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Three, the ‘principles geeks’ perhaps best exemplified by the Just Net Coalition who privileged principles over process. Divisions were also beginning to sharpen within the private sector. For example, Neville Roy Singham, CEO of Thoughtworks, agreed more with civil society than he did with other members of the private sector in his interventions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In short, the ‘outsiders’ couldn't care less about the outcome and will do everything to discredit it, the ‘process geeks’ stood in ovation when the outcome document was read at the closing plenary and the ‘principles geeks’ returned devastated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For the multi-stakeholder model to survive it must advance democratic values, not undermine them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This will only happen if there is greater transparency and accountability. Individuals, organisations and consortia that participate in Internet governance processes need to disclose lists of donors including those that sponsor travel to these meetings.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-hindu-business-line-may-10-2014-sunil-abraham-net-freedom-campaign-loses-its-way'&gt;https://cis-india.org/internet-governance/blog/the-hindu-business-line-may-10-2014-sunil-abraham-net-freedom-campaign-loses-its-way&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>NETmundial</dc:subject>
    

   <dc:date>2014-05-27T11:07:04Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-times-of-india-may-6-2014-laxmi-ajai-prasanna-civil-society-pushes-for-privacy-panel">
    <title>Civil Society Pushes for Privacy Panel</title>
    <link>https://cis-india.org/news/the-times-of-india-may-6-2014-laxmi-ajai-prasanna-civil-society-pushes-for-privacy-panel</link>
    <description>
        &lt;b&gt;The article was published in the Times of India on May 6, 2014. Sunil Abraham is quoted.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Civil society organizations are pushing for a 'privacy commission' to provide protection to individuals from illegal breach of their privacy, with guidelines imposing penal sanction against the violators. This assumes significance&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This assumes significance at a time when the Centre has decided to set up a judicial panel to probe the snoopgate scandal wherein the BJP government in Gujarat was allegedly involved in illegal surveillance of a woman architect and especially when the Right to Privacy Bill is pending in Parliament.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, industry consortia, including CII and FICCI, prefer lesser regulation, though calling for a cautious approach.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Among civil society organizations pressing for a stringent privacy bill is the International Centre for Free and Open Source Software (ICFOSS), the only representative from Kerala to attend the NETmundial conference held recently in Brazil. The meet focused on privacy issues to ensure basic human rights, including freedom of expression.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;NETmundial is the first step towards pushing for a privacy law against the snooping and spying on individuals by those in power, including agencies within and outside the country Privacy guidelines should be clear as to what data can be collected without infringing on the dignity of an individual as 'data' represents the duration of a call, while 'metadata' reveals the content of the caH," said ICFOSS director SatishBabu.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bangalore-based Centre for Internet and Society (CIS), another NETmundial participant, also stands for a strong privacy law. "The two-day conference that concluded on April 24 was a baby step towards a privacy law with a road map for global internet governance. It is the first step towards a multi-stakeholder model offering an equal footing for all civil society organizations, academia, government, private sector and the UN fora," said CIS executive director Sunil Abraham&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We are pushing for a privacy law in the country aimed at national privacy regulation and constituting a privacy commission on the lines of the information commission," he added.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/civil-society-privacy-bill.pdf" class="internal-link"&gt;Click to read the full story&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-times-of-india-may-6-2014-laxmi-ajai-prasanna-civil-society-pushes-for-privacy-panel'&gt;https://cis-india.org/news/the-times-of-india-may-6-2014-laxmi-ajai-prasanna-civil-society-pushes-for-privacy-panel&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>NETmundial</dc:subject>
    

   <dc:date>2014-05-27T11:39:20Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/filtering-content-on-the-internet">
    <title>Filtering content on the internet</title>
    <link>https://cis-india.org/internet-governance/blog/filtering-content-on-the-internet</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;hr /&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The op-ed was &lt;a class="external-link" href="http://www.thehindu.com/todays-paper/tp-opinion/filtering-content-on-the-internet/article5967959.ece"&gt;published in the Hindu&lt;/a&gt; on May 2, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;On May 5, the Supreme Court will hear Kamlesh Vaswani’s infamous anti-pornography petition again. The petition makes some rather outrageous claims. Watching pornography ‘puts the country’s security in danger’ and it is ‘worse than Hitler, worse than AIDS, cancer or any other epidemic,’ it says. This petition has been pending before the Court since February 2013, and seeks a new law that will ensure that pornography is exhaustively curbed.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Disintegrating into binaries&lt;/b&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The petition assumes that pornography causes violence  against women and children. The trouble with such a claim is that the  debate disintegrates into binaries; the two positions being that  pornography causes violence or that it does not. The fact remains that  the causal link between violence against women and pornography is yet to  be proven convincingly and remains the subject of much debate.  Additionally, since the term pornography refers to a whole range of  explicit content, including homosexual adult pornography, it cannot be  argued that all pornography objectifies women or glamorises violent  treatment of them.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Allowing even for the petitioner’s legitimate concern about  violence against women, it is interesting to note that of all the  remedies available, he seeks the one which is authoritarian but may not  have any impact at all. Mr. Vaswani could have, instead, encouraged the  state to do more toward its international obligations under the  Convention on the Elimination of Discrimination against Women (CEDAW).  CEDAW’s General Recommendation No. 19 is about violence against women  and recommends steps to be taken to reduce violence against women. These  include encouraging research on the extent, causes and effects of  violence, and adopting preventive measures, such as public information  and education programmes, to change attitudes concerning the roles and  status of men and women.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Child pornography&lt;/b&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Although different countries disagree about the necessity  of banning adult pornography, there is general international consensus  about the need to remove child pornography from the Internet. Children  may be harmed in the making of pornography, and would at the very  minimum have their privacy violated to an unacceptable degree. Being  minors, they are not in a position to consent to the act. Each act of  circulation and viewing adds to the harmful nature of child pornography.  Therefore, an argument can certainly be made for the comprehensive  removal of this kind of content.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Indian policy makers have been alive to this issue. The  Information Technology Act (IT Act) contains a separate provision for  material depicting children explicitly or obscenely, stating that those  who circulate such content will be penalised. The IT Act also  criminalises watching child pornography (whereas watching regular  pornography is not a crime in India).&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Intermediaries are obligated to take down child pornography  once they have been made aware that they are hosting it. Organisations  or individuals can proactively identify and report child pornography  online. Other countries have tried, with reasonable success, systems  using hotlines, verification of reports and co-operation of internet  service providers to take down child pornography. However, these systems  have also sometimes resulted in the removal of other legitimate  content.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Filtering speech on the Internet&lt;/b&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Child pornography can be blocked or removed using the IT  Act, which permits the government to send lists of URLs of illegal  content to internet service providers, requiring them to remove this  content. Even private parties can send notices to online intermediaries  informing them of illegal content and thereby making them legally  accountable for such content if they do not remove it. However, none of  this will be able to ensure the disappearance of child pornography from  the Internet in India.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Technological solutions like filtering software that  screens or blocks access to online content, whether at the state,  service provider or user level, can at best make child pornography  inaccessible to most people. People who are more skilled than amateurs  will be able to circumvent technological barriers since these are  barriers only until better technology enables circumvention.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Additionally, attempts at technological filtering usually  even affect speech that is not targeted by the filtering mechanism.  Therefore, any system for filtering or blocking content from the  Internet needs to build in safeguards to ensure that processes designed  to remove child pornography do not end up being used to remove political  speech or speeches that are constitutionally protected.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;In the Vaswani case, the government has correctly explained  to the Supreme Court that any greater attempt to monitor pornography is  not technologically feasible. It has pointed out that human monitoring  of content will delay transmission of data substantially, will slow down  the Internet, and will also be ineffective, since the illegal content  can easily be moved to other servers in other countries.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Making intermediaries liable for the content they host will  undo the safe harbour protection granted to them by the IT Act. Without  it, intermediaries like Facebook will actually have to monitor all the  content they host, and the resources required for such monitoring will  reduce the content that makes its way online. This would seriously  impact the extensiveness and diversity of content available on the  Internet in India. Additionally, when demands are made for the removal  of legitimate content, profit-making internet companies will be  disinclined to risk litigation much in the same way as Penguin was  reluctant to defend Wendy Doniger’s book.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;If the Supreme Court makes the mistake of creating a  positive obligation to monitor Internet content for intermediaries, it  will effectively kill the Internet in India.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;i&gt;(Chinmayi Arun &lt;/i&gt;is &lt;i&gt;research director, Centre for  Communication Governance, National Law University, Delhi, and fellow,  Centre for Internet and Society, &lt;/i&gt;Bangalore)&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/filtering-content-on-the-internet'&gt;https://cis-india.org/internet-governance/blog/filtering-content-on-the-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>chinmayi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-05-06T09:33:08Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/dml-central-april-17-2014-nishant-shah-networks-what-you-dont-see-is-what-you-for-get">
    <title>Networks: What You Don’t See is What You (for)Get</title>
    <link>https://cis-india.org/internet-governance/blog/dml-central-april-17-2014-nishant-shah-networks-what-you-dont-see-is-what-you-for-get</link>
    <description>
        &lt;b&gt;When I start thinking about DML (digital media and learning) and other such “networks” that I am plugged into, I often get a little confused about what to call them.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog entry was originally &lt;a class="external-link" href="http://dmlcentral.net/blog/nishant-shah/networks-what-you-don%E2%80%99t-see-what-you-forget"&gt;published in DML Central&lt;/a&gt; on April 17, 2014 and mirrored in &lt;a class="external-link" href="http://hybridpublishing.org/2014/05/what-you-dont-see-is-what-you-forget/"&gt;Hybrid Publishing Lab&lt;/a&gt; on May 13, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Are we an ensemble of actors? A cluster of friends? A conference of scholars? A committee of decision makers? An array of perspectives? A group of associates? A play-list of voices? I do not pose these  questions rhetorically, though I do enjoy rhetoric. I want to look at this inability to name collectives and the confusions and ambiguity it produces as central to our conversations around digital thinking. In particular, I want to look at the notion of the network. Because, I am sure, that if we were to go for the most neutralised digital term to characterise this collection that we all weave in and out of, it would have to be the network. We are a network.&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But, what does it mean to say that we are a network? The network is a very strange thing. Especially within the realms of the Internet, which, in itself, purports to be a giant network, the network is self-explanatory, self-referential and completely denuded of meaning. A network is benign, and like the digital, that foregrounds the network aesthetic, the network is inscrutable. You cannot really touch a network or name it. You cannot shape it or define it. You can produce momentary snapshots of it, but you can never contain it or limit it. The network cannot be held or materially felt.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And yet, the network touches us. We live within networked societies. We engage in networking – network as a verb. We are a network – network as a noun. We belong to networks – network as a collective. In all these poetic mechanisms of network, there is perhaps the core of what we want to talk about today – the tension between the local and the global and the way in which we will understand the Internet and then the frameworks of governance and policy that surround it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Let me begin with a genuine question. What predates the network? Because the network is a very new word. The first etymological trace of the network is in 1887, where it was used as a verb, within broadcast and communications models, to talk about an outreach. As in ‘to cover with a network.’ The idea of a network as a noun is older where in the 1550s, the idea of ‘net-like arrangements of threads, wires, etc.’ was first identified as a network. In the second half of the industrial 19th Century, the term network was used for understanding an extended, complex, interlocking system. The idea of network as a set of connected people emerged in the latter half of the 20thCentury. I am pointing at these references to remind us that the ubiquitous presence of the network, as a practice, as a collective, and as a metaphor that seeks to explain the rest of the world around us, is a relatively new phenomenon. And we need to be aware of the fact, that the network, especially as it is understood in computing and digital technologies, is a particular model through which objects, individuals and the transactions between them are imagined.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For anybody who looks at the network itself – especially the digital network that we have accepted as the basis on which everything from social relationships on Facebook to global financial arcs are defined – we know that the network is in a state of crisis.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Networks of crises: The Bangalore North East Exodus&lt;/h3&gt;
&lt;p&gt;Let me illustrate the multiple ways in which the relationship between networks and crisis has been imagined through a particular story. In August 2012, I woke up one morning to realise that I was living in a city of crisis. Bangalore, which is one of my homes, where the largest preoccupations to date have been about bad roads, stray dogs, and occasionally, the lack of a nightlife, was suddenly a space that people wanted to flee and occupy simultaneously.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Through the technology mediated gossip mill that produced rumours faster than the speed of a digital click, imagination of terror, danger, and material harm found currency. The city suddenly witnessed thousands of people running away from it, heading back to their imagined homelands. It was called the North East exodus, where, following an ethnic-religious clash between two traditionally hostile communities in Assam, there were rumours that the large North East Indian community in Bangalore was going to be attacked by certain Muslim factions at the end of Ramadan.&lt;br /&gt;The media spectacle of the exodus around questions of religion, ethnicity, regionalism and belonging only emphasised the fact that there is a new way of connectedness that we live in – the network society that no longer can be controlled, contained or corrected by official authorities and their voices. Despite a barrage of messages from law enforcement and security authorities, on email, on large screens on the roads, and on our cell phones, there was a growing anxiety and a spiralling information explosion that was producing an imaginary situation of precariousness and bodily harm. For me, this event, was one of the first signalling how to imagine the network society in a crisis, especially when it came to Bangalore, which is supposed to represent the Silicon dreams of an India that is shining brightly. While there is much to be unpacked about the political motivations and the ecologies of fear that our migrant lives in global cities are enshrined in, I want to specifically focus on what the emergence of this network society means.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is an imagination, especially in cities like Bangalore, of digital technologies as necessarily plugging in larger networks of global information consumption. The idea that technology plugs us into the transnational circuits is so huge that it only tunes us toward an idea of connectedness that is always outward looking, expanding the scope of nation, community and body.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the ways in which information was circulating during this phenomenon reminds us that digital networks are also embedded in local practices of living and survival. Most of the time, these networks are so natural and such an integral part of our crucial mechanics of urban life that they appear as habits, without any presence or visibility. In times of crises – perceived or otherwise – these networks make themselves visible, to show that they are also inward looking. But in this production of hyper-visible spectacles, the network works incessantly to make itself invisible.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Which is why, in the case of the North East exodus, the steps leading to the resolution of the crisis, constructed and fuelled by networks is interesting. As government and civil society efforts to control the rumours and panic reached an all-time high and people continued to flee the city, the government eventually went in to regulate the technology itself. There were expert panel discussions about whether the digital technologies are to be blamed for this rumour mill. There was a ban on mass-messaging and there was a cap on the number of messages which could be sent on a day by each mobile phone subscriber. The Information and Broadcast Ministry along with the Information Technologies cell, started monitoring and punishing people for false and inflammatory information.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Network as Crisis: The unexpected visibility of a network&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;What, then, was the nature of the crisis in this situation? It is a question worth exploring. We would imagine that this crisis was a crisis about the nationwide building of mega-cities filled with immigrant bodies that are not allowed their differences because they all have to be cosmopolitan and mobile bodies. The crisis could have been read as one of neo-liberal flatness in imagining the nation and its fragments, that hides the inherent and historical sites of conflict under the seductive rhetoric of economic development. And yet, when we look at the operationalization of the resolutions, it looked as if the crisis was the appearance and the visibility of the hitherto hidden local networks of information and communication.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In her analysis of networks, Brown University’s Wendy Chun posits that this is why networks are an opaque metaphor. If the function of metaphor is to explain, through familiarity, objects which are new to us, the network as an explanatory paradigm presents a new conundrum. While the network presumes and exteriority that it seeks to present, while the network allows for a subjective interiority of the actor and its decisions, while the network grants visibility and form to the everyday logic of organisation, what the network actually seeks to explain is itself. Or, in less evocative terms, the network is not only the framework through which we analyse, but it is also the object of analyses. Once the network has been deployed as a paradigm through which to understand a crisis, once the network has made itself visible, all our efforts are driven at explaining and strengthening, and almost like digital mothers, comfort the network back into its peaceful existence as infrastructure. We develop better tools to regulate the network. We define new parameters to mine the data more effectively. We develop policies to govern and govern through the network with greater transparency and ease.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus, in the case of the North East exodus, instead of addressing the larger issues of conservative parochialism, an increasing backlash by right-wing governments and a growing hostility that emerges from these cities that nobody possesses and nobody belongs to, the efforts were directed at blaming technology as the site where the problem is located and the network as the object that needs to be controlled. What emerged was a series of corrective mechanisms and a set of redundant regulations that controlled the number of text messages that people were able to send per day or policing the Internet for spreading rumours. The entire focus was on information management, as if the reason for the mass exodus of people from the NE Indian states and the sense of fragility that the city had been immersed in, was all due to the pervasive and ubiquitous information gadgets and their ability to proliferate in p2p (peer-to-peer) environments outside of the government’s control. This lack of exteriority to the network is something that very few critical voices have pointed out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Duncan Watts, the father of network computing, working through the logic of nodes, traffic and edges, has suggested there is a great problem in the ways in which we understand the process of network making. I am paraphrasing his complex mathematical text that explains the production of physical networks – what he calls the small worlds – and pointing out his strong critique about how the social scientists engage with networks. In the social sciences’ imagination of networks, there is a messy exteriority – fuzzy, complex and often not reducible to patterns or basic principles. The network is a distilling of the messy exteriority, a representation of the complex interplay between different objects and actors, and a visual mapping of things as they are. Which is to say, we imagine there is a material reality and the network is a tool by which this reality, or at least parts of this reality, are mapped and represented to us in patterns which can help us understand the true nature of this reality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Drawing from practices of network modelling and building, Watts proved, that we have the equation wrong. The network is not a representation of reality but the ontology of reality. The network is not about trying to make sense of an exteriority. Instead, the network is an abstract and ideological map that constructs the reality in a particular way. In other words, the network precedes the real, and because of its ability to produce objective, empiricist and reductive principles (constantly filtering out that which is not important to the logic or the logistics of the network design), it then gives us a reality that is produced through the network principles. To make it clear, the network representation is not the derivative of the real but the blue-print of the real. And the real as we access it, through these networked tools, is not the raw and messy real but one that is constructed and shaped by the network in those ways. The network, then, needs to be understood, examined and critiqued, not as something that represents the natural, but something that shapes our understanding of the natural itself.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the case of the Bangalore North East Exodus, the network and its visibility created a problem for us – and the problem was, that the network, which is supposed to be infrastructure, and hence, by nature invisible, had suddenly become visible. We needed to make sure that it was shamed, blamed, named and tamed so that we can go back to our everyday practices of regulation, governance and policy.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Intersectional Network&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;What I want to emphasise, then, is that this binary of local versus the global, or local working in tandem with global, or the quaintly hybridised glocal are not very generative in thinking of policy and politics around the Internet. What we need is to recognise what gets hidden in this debate. What becomes visible when it is not supposed to? What remains invisible beyond all our efforts? And how do we develop a framework that actually moves beyond these binary modes of thinking, where the resolution is either to collapse them or to pretend that they do not exist in the first place? Working with frameworks like the network makes us aware of the ways in which these ideas of the global and the local are constructed and continue to remain the focus of our conversations, making invisible the real questions at hand.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hence, we need to think of networks, not as spaces of intersection, but in need of intersections. The networks, because of their predatory, expanding nature, and the constant interaction with the edges, often appear as dynamic and inclusive. We need to now think of the networks as in need of intersections – or of intersectional networks. Developing intersections, of temporality, of geography and of contexts are great. But, we need to move one step beyond – and look at the couplings of aspiration, inspiration, autonomy, control, desire, belonging and precariousness that often mark the new digital subjects. And our policies, politics and regulations will have to be tailored to not only stop the person abandoning her life and running to a place of safety, not only stop the rumours within the Information and communication networks, not only create stop-gap measures of curbing the flows of gossip, but to actually account for the human conditions of life and living.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. This post has grown from conversations across three different locations. The first draft of this talk was presented at the Habits of Living Conference, organised by the Centre for Internet &amp;amp; Society and Brown University, in Bangalore. A version of this talk found great inputs from the University of California Humanities Research Institute in Irvine, where I found great ways of sharpening the focus. The responses at the Milton Wolf Seminar at the America Austria Foundation, Austria, to this story, helped in making it more concrete to the challenges that the “network” throws to our digital modes of thinking. I am very glad to be able to put the talk into writing this time, and look forward to more responses.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/dml-central-april-17-2014-nishant-shah-networks-what-you-dont-see-is-what-you-for-get'&gt;https://cis-india.org/internet-governance/blog/dml-central-april-17-2014-nishant-shah-networks-what-you-dont-see-is-what-you-for-get&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-05-28T09:30:45Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/april-2014-bulletin">
    <title>April 2014 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/april-2014-bulletin</link>
    <description>
        &lt;b&gt;The newsletter for the month of April can be accessed below:&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;We at the Centre for Internet &amp;amp; Society (CIS) welcome you to the fourth issue of the newsletter (April) for the year 2014. Archives of our newsletters can be accessed at: &lt;a href="https://cis-india.org/about/newsletters/"&gt;http://cis-india.org/about/newsletters&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Highlights&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;We have published a compilation of the various central government schemes in a blog post as part of our National Resource Kit project.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The 27&lt;sup&gt;th&lt;/sup&gt; session of the WIPO Standing Committee on Copyright and Related Rights (WIPO-SCCR) was held in Geneva from April 28 to May 2, 2014. Nehaa Chaudhari participated in the event. CIS made its statements on Technological Measures of Protection on Limitations and Exceptions for Libraries and Archives, Orphan Works, Retracted and Withdrawn Works, and Works out of Commerce on Limitations and Exceptions for Libraries and Archives, and on the WIPO Proposed Treaty for the Protection of Broadcasting Organizations. &lt;/li&gt;
&lt;li&gt;CIS signed a memorandum of understanding (MoU) with Mysore University for converting to Unicode and re-releasing their encyclopaedia under Creative Commons License. Dr. U.B. Pavanaja on behalf of the CIS-A2K team signed the MoU.&lt;/li&gt;
&lt;li&gt;A two-day global stakeholder meeting on future of internet governance (NETmundial) was organized by the Brazilian Internet Steering Committee in partnership with /1Net at Sao Paulo in Brazil on April 23 and 24, 2014. Achal Prabhala participated in the event. As part of its research to enable productive discussions of the critical internet governance issues at the meeting and elsewhere CIS published a total of 16 blog entries. &lt;/li&gt;
&lt;li&gt;We conducted an empirical study of five separate and diverse banks (State Bank of India, Central Bank of India, ICICI Bank, IndusInd Bank, and Standard Chartered Bank) to gain a practical perspective on the existing banking practices and policies in India, and published a Banking Policy Guide. &lt;/li&gt;
&lt;li&gt;As part of the Making Change project Denisse Albornoz interviewed Tuhin Paul, an artist and storyteller behind Menstrupedia, an India-based social venture creating comics to shatter the myths and misunderstandings surrounding menstruation around the world. Denisse provides an analysis of ‘menstrual activism’ — a movement that despite its trajectory in feminism remains unnoticed in most accounts of traditional and digital activism.&lt;/li&gt;
&lt;li&gt;Six research studies were commissioned by HEIRA-CSCS (over November 2013-March 2014) as part of the collaborative exercise with CIS to map the Digital Humanities within a broad rubric of exploring changes at the intersection of youth, technology and higher education in India. P.P.Sneha in her blog post presents a broad overview of some of the key learnings from these projects.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;&lt;b&gt;&lt;a href="https://cis-india.org/jobs"&gt;Jobs&lt;br /&gt;&lt;/a&gt;&lt;/b&gt;CIS is seeking applications for the post of &lt;a href="https://cis-india.org/jobs/programme-officer-access-to-knowledge-and-openness"&gt;Programme Officer&lt;/a&gt; (Access to Knowledge). There are two vacancies for this post one in Delhi and one in Bangalore. To apply, please send your resume to Sunil Abraham (&lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt;), Nirmita Narasimhan (&lt;a href="mailto:nirmita@cis-india.org"&gt;nirmita@cis-india.org&lt;/a&gt;) and Pranesh Prakash (&lt;a href="mailto:pranesh@cis-india.org"&gt;pranesh@cis-india.org&lt;/a&gt;) with three writing samples of which at least one demonstrates your analytic skills, and one that shows your ability to simplify complex policy issues.&lt;/p&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/accessibility"&gt;Accessibility and Inclusion&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Under a grant from the Hans Foundation we are doing two projects. The first project is on creating a national resource kit of state-wise laws, policies and programmes on issues relating to persons with disabilities in India. We compiled the first draft of the kit (29 states and 6 union territories). The chapters along with the quarterly reports can be accessed on the &lt;a href="https://cis-india.org/accessibility/resources/national-resource-kit-project"&gt;project page&lt;/a&gt;. The second project is on developing text-to-speech software for 15 Indian languages. The progress made so far in the project can be accessed &lt;a href="https://cis-india.org/accessibility/resources/nvda-text-to-speech-synthesizer"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;h3&gt;NVDA&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Monthly Update&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/resources/nvda-text-to-speech-synthesizer"&gt;NVDA e-Speak Text-to-Speech Project Update&lt;/a&gt; (by Suman Dogra, April 28, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;National Resource Kit&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/central-government-schemes"&gt;Central Government Schemes&lt;/a&gt; (by Anandhi Viswanathan and CLPR, April 27, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Other&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/polling-pains"&gt;Polling Pains&lt;/a&gt; (by Amba Salelkar, April 30, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/new-indian-express-april-8-2014-papiya-bhattacharya-are-elections-fair-to-people-with-special-needs"&gt;Are Elections Fair to People With Special Needs?&lt;/a&gt; (by Papiya Bhattacharya, New Indian Express, April 8, 2014). &lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/vijay-karnataka-april-9-2014-enabling-elections"&gt;Enabling Elections&lt;/a&gt; (Vijay Karnataka, April 9, 2014). This was published in Kannada. &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;As part of the Access to Knowledge programme we are doing two projects. The first one (Pervasive Technologies) under a grant from the International Development Research Centre (IDRC) is for research on the complex interplay between pervasive technologies and intellectual property to support intellectual property norms that encourage the proliferation and development of such technologies as a social good. The second one (Wikipedia) under a grant from the Wikimedia Foundation is for the growth of Indic language communities and projects by designing community collaborations and partnerships that recruit and cultivate new editors and explore innovative approaches to building projects.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;WIPO SCCR&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;Standing Committee on Copyright and Related Rights: Twenty-Seventh Session (organized by WIPO, Geneva, April 28 – May 2, 2014). Nehaa Chaudhari participated in the event. France, Greece, India and the European Union &lt;a href="https://cis-india.org/a2k/blog/france-greece-india-eu-sign-marrakesh-treaty"&gt;signed the Marrakesh Treaty&lt;/a&gt;. CIS delivered statements on &lt;a href="https://cis-india.org/a2k/blog/cis-statement-on-technological-measures-of-protection-27-sccr-on-limitations-exceptions-for-libraries-and-archives"&gt;Technological Measures of Protection on Limitations and Exceptions for Libraries and Archives&lt;/a&gt;, &lt;a href="https://cis-india.org/a2k/blog/cis-statement-orphan-works-retracted-withdrawn-works-and-works-out-of-commerce-at-27-sccr-on-limitations-and-exceptions-for-libraries-and-archives"&gt;Orphan Works, Retracted and Withdrawn Works, and Works out of Commerce on Limitations and Exceptions for Libraries and Archives&lt;/a&gt;, and on the &lt;a href="https://cis-india.org/a2k/blog/cis-statement-27-sccr-on-wipo-proposed-treaty-for-protection-of-broadcasting-organizations"&gt;WIPO Proposed Treaty for the Protection of Broadcasting Organizations&lt;/a&gt;. Transcripts of the discussions can be &lt;a href="https://cis-india.org/a2k/blog/wipo-sccr-27-discussions-transcripts"&gt;accessed here&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/blog/report-on-cpdip-2"&gt;Report on CDIP-12&lt;/a&gt; (by Puneeth Nagraj, April 22, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/blog/signing-and-ratification-of-marrakesh-treaty-to-facilitate-access-to-published-works-for-persons-blind-visually-impaired-print-disabled"&gt;Signing and Ratification of the Marrakesh Treaty to Facilitate Access to Published Works for Persons who are Blind, Visually Impaired, or Otherwise Print Disabled&lt;/a&gt; (by Nehaa Chaudhari, April 25, 2014). &lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/blog/report-on-wipo-director-general-meeting-with-ngos"&gt;Report on the WIPO Director General’s Meeting with NGO’s&lt;/a&gt; (by Puneeth Nagraj, April 30, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/knowledge-ecology-international-manon-ress-april-29-2014-is-wipo-treaty-for-broadcasters-moving-forward-at-sccr-27"&gt;Is the WIPO Treaty for Broadcasters Moving Forward at SCCR 27?&lt;/a&gt; (by Manon Ress, Knowledge Ecology International, April 29, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/ip-watch-catherine-saez-may-1-2014-wipo-authors-civil-society-watchful-of-rights-for-broadcasters"&gt;At WIPO, Authors, Civil Society Watchful of Rights for Broadcasters&lt;/a&gt; (by Catherine Saez, IP Watch, May 1, 2014).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Other&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Organized&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/openness/events/nasa-international-space-apps-challenge-2014"&gt;NASA International Space Apps Challenge 2014&lt;/a&gt; (CIS, Bangalore, April 12 – 13, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/blog/online-survey-for-indian-mobile-app-developer-enterprise"&gt;Online Survey for Indian Mobile App Developer Startups &amp;amp; Enterprises&lt;/a&gt; (by Samantha Cassar, April 9, 2014). &lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/blog/app-developers-series-services-products-dichotomy-ip-2013-part-i"&gt;App Developers Series: Services, Products, Dichotomy &amp;amp; IP – Part I&lt;/a&gt; (by Samantha Cassar, April 10, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/blog/report-on-cpdip-2"&gt;Report on CDIP-12&lt;/a&gt; (by Puneeth Nagraj, April 22, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/blog/report-on-31-session-of-standing-committee-on-trademarks"&gt;Report on the 31st Session of the Standing Committee on Trademarks&lt;/a&gt; (by Puneeth Nagraj, April 29, 2014).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Wikipedia&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The following has been done under &lt;a href="https://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;grant from the Wikimedia Foundation&lt;/a&gt;:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Announcement&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/openness/blog/cis-signs-mou-with-mysore-university"&gt;CIS Signs MoU with Mysore University&lt;/a&gt; (by Dr. U.B.Pavanaja, April 16, 2014): for converting to Unicode and re-releasing their encyclopaedia under Creative Commons License. Dr. U.B. Pavanaja on behalf of the CIS-A2K team signed the MoU. The signing event took place earlier on February 22, 2014. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Articles&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/openness/blog/openaccessweek-april-3-2014-subhashish-panigrahi-vachana-sanchaya"&gt;Vachana Sanchaya: Bringing Access to 11th century Kannada Literature&lt;/a&gt; (by Subhashish Panigrahi, April 3, 2014)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/openness/blog/subhashish-panigrahi-article-in-amalekha"&gt;୭୯ ବର୍ଷରେ ସ୍ୱତନ୍ତ୍ର ଓଡ଼ିଶା: ଶାସ୍ତ୍ରୀୟ ଓଡ଼ିଆ ଓ କମ୍ପ୍ୟୁଟରରେ ଏହାର ବ୍ୟବ‌ହାର&lt;/a&gt; (by Subhashish Panigrahi, Amalekha, April 4, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/openness/blog/kadambini-april-8-2014-subhashish-panigrahi-odia-language-and-development-in-digital-era"&gt;ଓଡ଼ିଅା ଭାଷାର ବିକାଶ ଓ କମ୍ପ୍ୟୁଟର&lt;/a&gt; (by Subhashish Panigrahi, The Kadambini, April 8, 2014). &lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/openness/blog/creative-commons-subhashish-panigrahi-april-18-2014-report-from-india-relicensing-books-under-creative-commons"&gt;Report from India: Relicensing books under CC&lt;/a&gt; (by Subhashish Panigrahi, Creative Commons Blog, April 19, 2014). &lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/openness/blog/dna-rohini-lakshane-april-26-2014-14-books-re-released-under-creative-commons-license"&gt;14 Odia books re-released under Creative Commons license&lt;/a&gt; (by Subhashish Panigrahi, DNA, April 26, 2014). The article was edited by Rohini Lakshane.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Events Organized&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/openness/events/tulu-wikipedia-workshop"&gt;Tulu Wikipedia Workshop&lt;/a&gt; (organized by CIS-A2K, Balmatta Computer Centre, Mangalore, April 5, 2014). Dr. U.B.Pavanaja conducted the workshop. &lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/daijiworld-april-6-2014-mangalore-wikipedia-workshop-held-for-konkani-writers"&gt;Konkani Wikipedia Workshop&lt;/a&gt; (co-organized by All India Konkani Writers Organization and CIS-A2K, Kalaangann Shaktinagar, April 6, 2014). Dr. U.B.Pavanaja conducted the workshop.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/openness/events/tulu-wikipedia-editathon"&gt;Tulu Wikipedia Editathon&lt;/a&gt; (co-organized by Karnataka Theological College and CIS-A2K, Mangalore, April 19, 2014). Dr. U.B.Pavanaja conducted the workshop.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/wiki-session-for-prajavani-journalists"&gt;Wikipedia Session for Trainee Journos&lt;/a&gt; (organized by Prajavani, Bangalore, April 28, 2014). Dr. U.B.Pavanaja took a session for the trainee journalists of Prajavani Kannada daily on Wikipedia. &lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/world-book-day"&gt;World Book Day&lt;/a&gt; (organized by Karnataka Publishers’ Association, Indian Institute of World Culture, Basavanagudi, Bangalore, April 23, 2014). Dr. U.B.Pavanaja was a speaker.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/relevance-of-bhagabat-tungi-in-evolution-of-odia-language?searchterm=Relevance+of+Bhagabat+Tungi+in+the+evolution+of+Odia+language+from+Buddha+era+to+digital+age"&gt;Relevance of Bhagabat Tungi in the evolution of Odia language from Buddha era to digital age&lt;/a&gt; (organized by The Intellects, Shree Jagannath Mandir and Odisha Art and Cultural Center, New Delhi, April 24, 2014). Subhashish Panigrahi participated in the event.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Media Coverage&lt;br /&gt;&lt;/b&gt;CIS gave its inputs to the following media coverage:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/daijiworld-april-6-2014-mangalore-wikipedia-workshop-held-for-konkani-writers"&gt;M'lore: Wikipedia Workshop held for Konkani writers&lt;/a&gt; (Daijiworld, April 6, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://rising.globalvoicesonline.org/blog/2014/04/10/odia-loves-wikipedia/"&gt;Odia Loves Wikipedia&lt;/a&gt; (Rising Voices, April 10, 2014). This was also published in &lt;a href="http://es.globalvoicesonline.org/2014/04/12/el-idioma-oriya-ama-a-wikipedia/"&gt;Spanish&lt;/a&gt; and in &lt;a href="http://ru.globalvoicesonline.org/2014/04/13/28775/"&gt;Russian&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.thehindu.com/todays-paper/tp-national/tp-karnataka/international-book-day/article5932673.ece"&gt;International Book Day&lt;/a&gt; (The Hindu, April 21, 2014). &lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/deccan-herald-april-23-2014-books-are-a-bridge-between-generations"&gt;Books are a bridge between generations&lt;/a&gt; (The Deccan Herald, April 23, 2014). &lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/vijayavani-april-23-2014-world-book-day"&gt;World Book Day Report&lt;/a&gt; (Vijaywani, April 23, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/eodishasamacharseminar-on-odia-language-in-new-delhi-by-the-intellects"&gt;Seminar on Odia Language in New Delhi by the Intellects&lt;/a&gt; (Odisha Samachar, April 24, 2014). &lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.dailypioneer.com/state-editions/bhubaneswar/delhi-meet-focuses-on-bhagabat-tungi-revival.html"&gt;Delhi meet focuses on Bhagabat Tungi revival&lt;/a&gt; (The Pioneer, April 26, 2014).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;As part of its research on privacy and free speech, CIS is engaged with two different projects. The first one (under a grant from Privacy International and International Development Research Centre (IDRC)) is on surveillance and freedom of expression (SAFEGUARDS). The second one (under a grant from MacArthur Foundation) is on studying the restrictions placed on freedom of expression online by the Indian government.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;NETmundial&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As part of its participation in the NETmundial event organized in Brazil by Brazilian Internet Steering Committee in partnership with /1Net at Sao Paulo on April 23 and 24, 2014 CIS produced a total of 16 outputs:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Sumandro Chattapadhyay produced these visual representations: &lt;a href="https://cis-india.org/internet-governance/blog/net-mundial-comparing-appearance-of-fifty-most-frequent-words"&gt;Comparing Appearance of Fifty Most Frequent Words&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/net-mundial-contributions-by-countries-of-origin"&gt;Contributions by Countries of Origin&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/net-mundial-contributions-by-types-of-organisation"&gt;Contributions by Types of Organisation&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/net-mundial-which-countries-have-not-contributed-to-net-mundial"&gt;Which Countries Have Not Submitted Contributions to NETmundial?&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/net-mundial-which-governments-have-not-contributed-to-net-mundial"&gt;Which Governments Have Not Submitted Contributions to NETmundial?&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/net-mundial-word-clouds-of-contributions-by-types-of-organisation"&gt;Word Clouds of Contributions by Types of Organisation&lt;/a&gt; and &lt;a href="https://cis-india.org/internet-governance/blog/net-mundial-tracking-multi-stakeholder-across-contributions"&gt;Tracking *Multistakeholder* across Contributions&lt;/a&gt;. Achal Prabhala participated in the event and wrote these: &lt;a href="https://cis-india.org/internet-governance/blog/net-mundial-day-0"&gt;Day 0&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/net-mundial-day-1"&gt;Day 1&lt;/a&gt;, and &lt;a href="https://cis-india.org/internet-governance/blog/net-mundial-day-2"&gt;Day 2&lt;/a&gt;. &lt;a href="https://cis-india.org/internet-governance/blog/netmundial-transcript-archive"&gt;Transcript of the NETmundial&lt;/a&gt; for archival purposes was made available by Pranesh Prakash. Smarika Kumar produced two research outputs: &lt;a href="https://cis-india.org/internet-governance/blog/net-mundial-and-suggestions-for-iana-administration"&gt;NETmundial and Suggestions for IANA Administration&lt;/a&gt; and &lt;a href="https://cis-india.org/internet-governance/blog/accountability-of-icann"&gt;Accountability of ICANN&lt;/a&gt;. Geetha Hariharan wrote two blog posts: &lt;a href="https://cis-india.org/internet-governance/blog/marco-civil-da-internet"&gt;Marco Civil da Internet: Brazil’s ‘Internet Constitution’&lt;/a&gt; and &lt;a href="https://cis-india.org/internet-governance/blog/brazil-passes-marco-civil-us-fcc-alters-stance-on-net-neutrality"&gt;Brazil passes Marco Civil; the US-FCC Alters its Stance on Net Neutrality&lt;/a&gt;. Jyoti Panday wrote one blog post: &lt;a href="https://cis-india.org/internet-governance/blog/net-mundial-roadmap-defining-roles-of-stakeholders-in-multistakeholderism"&gt;NETmundial Roadmap: Defining the Roles of Stakeholders in Multistakeholderism&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Analyses&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/report-of-group-of-experts-on-privacy-vs-leaked-2014-privacy-bill"&gt;Report of the Group of Experts on Privacy vs. The Leaked 2014 Privacy Bill&lt;/a&gt; (by Elonnai Hickok, April 14, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/banking-policy-guide"&gt;Banking Policy Guide&lt;/a&gt; (by Elonnai Hickok, April 22, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/the-embodiment-of-right-to-privacy-within-domestic-legislation"&gt;The Embodiment of the Right to Privacy within Domestic Legislation&lt;/a&gt; (by Tanvi Mani, April 29, 2014).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Articles&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/yojana-april-2014-sunil-abraham-who-governs-the-internet-implications-for-freedom-and-national-security"&gt;Who Governs the Internet? Implications for Freedom and National Security&lt;/a&gt; (by Sunil Abraham, Yojana, April 4, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/the-hoot-bhairav-acharya-april-15-2014-privacy-law-in-india-a-muddled-field-1"&gt;Privacy Law in India: A Muddled Field – I&lt;/a&gt; (by Bhairav Acharya, The Hoot, April 15, 2014). &lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/council-for-responsible-genetics-april-2014-sunil-abraham-very-big-brother"&gt;Very Big Brother&lt;/a&gt; (by Sunil Abraham, GeneWatch, January – April 2014 Issue).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/south-african-protection-personal-information-act-2013"&gt;South African Protection of Personal Information Act, 2013&lt;/a&gt; (by Divij Joshi, April 16, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="http://cgcs.asc.upenn.edu/fileLibrary/PDFs/MW_Updated_Agenda_for_Website.pdf"&gt;Milton Wolf Seminar on Media and Diplomacy: The Third Man Theme Revisited: Foreign Policies of the Internet in a Time Of Surveillance and Disclosure&lt;/a&gt; (jointly organized by the Center for Global Communication Studies (CGCS) at the University of Pennsylvania’s Annenberg School for Communication, the American Austrian Foundation (AAF), and the Diplomatic Academy of Vienna (DA), Vienna, March 30 – April 1, 2014). Nishant Shah participated in the event as a panelist.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/gsma-partners-meeting"&gt;GSMA Partners Meeting&lt;/a&gt; (organized by Privacy International, London, April 9, 2014). Elonnai Hickok participated in this meeting.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/critical-life-of-information"&gt;The Critical Life of Information&lt;/a&gt; (organized by Yale University, 100 Wall Street, April 11, 2014). Nishant Shah spoke in the panel on Big Data and Governance. Malavika Jayaram spoke in the panel on Big Data and the Arts.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/round-table-on-user-safety-on-internet"&gt;Round-table on User Safety on the Internet&lt;/a&gt; (organized by Consumer Voice and Google, Infantry Road, Bangalore, April 24, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/ssn-2014-sixth-biannual-surveillance-and-society-conference"&gt;6th Biannual Surveillance and Society Conference&lt;/a&gt; (organized by Eticas Research and Consulting, University of Barcelona and CCCB, April 26 – 24, 2014). Malavika Jayaram gave a talk on “Biometrics in beta: experimenting on a nation (while normalising surveillance for 1.2 billion people)”.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Other&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Articles&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/cgcs-nishant-shah-april-1-2014-between-the-local-and-the-global"&gt;Between the Local and the Global: Notes Towards Thinking the Nature of Internet Policy&lt;/a&gt; (by Nishant Shah, cgcsblog, April 1, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/dml-central-april-17-2014-nishant-shah-networks-what-you-dont-see-is-what-you-for-get"&gt;Networks: What You Don’t See is What You (for)Get&lt;/a&gt; (by Nishant Shah, April 17, 2014).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news"&gt;News &amp;amp; Media Coverage&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS gave its inputs to the following media coverage:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/outlook-april-1-2014-two-indians-in-global-commission-on-web-governance"&gt;Two Indians in Global Commission on Web Governance&lt;/a&gt; (April 1, 2014): Sunil Abraham was named as one of the experts. This was published in &lt;a href="http://news.outlookindia.com/items.aspx?artid=835007"&gt;Outlook&lt;/a&gt;, &lt;a href="http://articles.economictimes.indiatimes.com/2014-04-01/news/48767578_1_internet-governance-two-indians-general-dynamics"&gt;Economic Times&lt;/a&gt;, and in &lt;a href="http://mattersindia.com/two-indians-among-25-selected-for-internet-governance-network/"&gt;Matters India&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/newslaundry-april-1-2014-somi-das-the-take-down-of-free-speech-online"&gt;The Take Down of Free Speech Online&lt;/a&gt; (Newslaundry, April 1, 2014): CIS research on Intermediary Liabilities is quoted.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/livemint-april-1-2014-shweta-taneja-the-politics-of-facebook"&gt;The politics of Facebook&lt;/a&gt; (by Shweta Tiwari, April 1, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/business-standard-april-3-2014-surabhi-agarwal-new-privacy-bill-more-refined-has-wider-ambit-say-experts"&gt;New privacy Bill more refined &amp;amp; has wider ambit, say experts&lt;/a&gt; (by Surabhi Agarwal, Business Standard, April 2, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/economic-times-april-3-2014-m-rajshekhar-should-nandan-nilekani-aadhar-project-for-identity-proof-and-welfare-delivery-exist"&gt;Should Nandan Nilekani's Aadhaar project, for identity proof and welfare delivery, exist at all?&lt;/a&gt; (by M. Rajshekhar, April 3, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/economic-times-april-10-2014-varuni-khosla-lok-sabha-polls"&gt;Lok sabha polls: Social media companies launch special pages for polls&lt;/a&gt; (by Varuni Khosla, Economic Times, April 10, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/governance-now-april-12-2014-pratap-vikram-singh-parties-give-short-shrift-to-privacy"&gt;Parties give short shrift to privacy&lt;/a&gt; (by Pratap Vikram Singh, GovernanceNow.com, April 12, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/governance-now-april-13-2014-pratap-vikram-singh-no-party-has-got-clear-stand-aadhaar-fate-hangs-in-balance"&gt;No party's got a clear stand, Aadhaar's fate hangs in balance&lt;/a&gt; (by Pratap Vikram Singh, GovernanceNow.com, April 13, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/the-times-of-india-april-24-2014-india-wants-core-internet-infrastructure"&gt;'India wants core internet infrastructure'&lt;/a&gt; (by Indrani Bagchi, April 24, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/the-times-of-india-april-25-indrani-bagchi-india-for-inclusive-internet-governance"&gt;India for inclusive internet governance&lt;/a&gt; (by Indrani Bagchi, April 25, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/dna-amrita-madhukalya-april-26-2014-facebook-launches-fb-newswire-for-journalists-loses-part-of-its-immunity-under-it-act-2000"&gt;Facebook launches FB Newswire for journalists; loses part of its immunity under IT Act 2000&lt;/a&gt; (by Amrita Madhukalya, DNA, April 26, 2014).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/raw/digital-humanities"&gt;Digital Humanities&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS is building research clusters in the field of Digital Humanities. The Digital will be used as a way of unpacking the debates in humanities and social sciences and look at the new frameworks, concepts and ideas that emerge in our engagement with the digital. The clusters aim to produce and document new conversations and debates that shape the contours of Digital Humanities in Asia:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/raw/digital-humanities/confession-in-digital-age"&gt;Confession in the Digital Age&lt;/a&gt; (by Rimi Nandy, April 14, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/raw/digital-humanities/animating-the-archive"&gt;Animating the Archive – A Survey of Printed Digitized Materials in Bengali and their Use in Higher Education&lt;/a&gt; (by Saidul Haque, April 14, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/raw/digital-humanities/doing-digital-humanities"&gt;‘Doing’ Digital Humanities: Reflections on a project on Online Feminism in India&lt;/a&gt; (by Sujatha Subramanian, April 14, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/raw/digital-humanities/the-machinistic-paradigm-collapse"&gt;The Machinistic Paradigm Collapse&lt;/a&gt; (by Anirudh Sridhar, April 14, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/raw/digital-humanities/exploring-the-digital-landscape"&gt;Exploring the Digital Landscape: An Overview&lt;/a&gt; (by P.P.Sneha, April 14, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/raw/digital-humanities/digital-humanities-problem-of-definition"&gt;Digital Humanities and the Problem of Definition&lt;/a&gt; (by P.P.Sneha, April 25, 2014).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/digital-natives"&gt;Digital Natives&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;CIS is doing a research project titled “Making Change”. The project will explore new ways of defining, locating, and understanding change in network societies. Having the thought piece 'Whose Change is it Anyway' as an entry point for discussion and reflection, the project will feature profiles, interviews and responses of change-makers to questions around current mechanisms and practices of change in South Asia and South East Asia:&lt;/p&gt;
&lt;h3&gt;Making Change Project&lt;b&gt; &lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/digital-natives/making-change/multimedia-storytellers"&gt;Multimedia Storytellers: Panel Discussion&lt;/a&gt; (by Denisse Albornoz, April 16, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/digital-natives/making-change/menstrupedia-taboo-beautiful"&gt;From Taboo to Beautiful – Menstrupedia&lt;/a&gt; (by Denisse Albornoz, April 30, 2014).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/telecom"&gt;Telecom&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS is involved in promoting access and accessibility to telecommunications services and resources and has provided inputs to ongoing policy discussions and consultation papers published by TRAI. It has prepared reports on unlicensed spectrum and accessibility of mobile phones for persons with disabilities and also works with the USOF to include funding projects for persons with disabilities in its mandate:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Organized&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/events/tech-talk-landscape-of-wireless-communications-and-electromagnetic-spectrum"&gt;Tech Talk: Landscape of Wireless Communications &amp;amp; Electromagnetic Spectrum&lt;/a&gt; (CIS, Bangalore, April 28, 2014). A. Radha Krishna gave a talk on wireless communication technologies.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/"&gt;About CIS&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society is a non-profit research organization that works on policy issues relating to freedom of expression, privacy, accessibility for persons with disabilities, access to knowledge and IPR reform, and openness (including open government, FOSS, open standards, etc.), and engages in academic research on digital natives and digital humanities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Follow us elsewhere&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Twitter:&lt;a href="https://twitter.com/CISA2K"&gt; &lt;/a&gt;&lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Facebook group: &lt;a href="https://www.facebook.com/cisa2k"&gt;https://www.facebook.com/cisa2k&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Visit us at:&lt;a href="https://cis-india.org/"&gt; &lt;/a&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge"&gt;https://meta.wikimedia.org/wiki/India_Access_To_Knowledge&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;E-mail: &lt;a href="mailto:a2k@cis-india.org"&gt;a2k@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;► Support Us&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Please help us defend consumer / citizen rights on the Internet! Write a cheque in favour of ‘The Centre for Internet and Society’ and mail it to us at No. 194, 2nd ‘C’ Cross, Domlur, 2nd Stage, Bengaluru – 5600 71.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Request for Collaboration:&lt;br /&gt;We invite researchers, practitioners, and theoreticians, both organisationally and as individuals, to collaboratively engage with Internet and society and improve our understanding of this new field. To discuss the research collaborations, write to Sunil Abraham, Executive Director, at &lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt; or Nishant Shah, Director – Research, at &lt;a href="mailto:nishant@cis-india.org"&gt;nishant@cis-india.org&lt;/a&gt;. To discuss collaborations on Indic language Wikipedia, write to T. Vishnu Vardhan, Programme Director, A2K, at &lt;a href="mailto:vishnu@cis-india.org"&gt;vishnu@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CIS is grateful to its primary donor the Kusuma Trust founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin for its core funding and support for most of its projects. CIS is also grateful to its other donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans Foundation, MacArthur Foundation, and IDRC for funding its various projects.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/april-2014-bulletin'&gt;https://cis-india.org/about/newsletters/april-2014-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2014-07-04T03:38:00Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-embodiment-of-right-to-privacy-within-domestic-legislation">
    <title>The Embodiment of the Right to Privacy within Domestic Legislation</title>
    <link>https://cis-india.org/internet-governance/blog/the-embodiment-of-right-to-privacy-within-domestic-legislation</link>
    <description>
        &lt;b&gt;The Right to Privacy is a pivotal construct, essential to the actualization of justice, fairness and equity within any democratic society. It is an instrument used to secure the boundaries of an individual’s personal space, in his interaction with not only the rest of society but also the State. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;It is within this realm of the social transaction that there exists an unending conflict between the Right to Privacy of an individual and the overbearing hand of the State as a facilitator of public interest. This right thus acts as a safety valve providing individuals with a sacred space within which their interactions in their personal capacity have no bearing on their conduct in the public sphere. The preservation of this space is incredibly important in order to ensure a willingness of individuals to engage and cooperate with the State in its fulfillment of public welfare measures that would otherwise be deemed as intrusive. It is in this regard that the Right to Privacy, one of the last sustaining rights that an individual holds against a larger State interest, ought to be protected by the law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are numerous dimensions to the idea of the Right to Privacy. These include but are not limited to the privacy of person, privacy of communication, personal privacy, transactional privacy, privacy of information and the privacy of personal data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Supreme Court of India has come to the rescue of individuals, time and again by construing "Right to Privacy" as an extension of the Fundamental Right to “Protection of Life and Personal liberty” under Article 21 of the Constitution. This has been reflected in the adjudicatory jurisprudence of the Constitutional courts in the country. However, there exists no Constitutional remedy to redress the breach of privacy by a nongovernmental actor, except under tortuous liability. The power and authority of public and private institutions to use an individual’s personal data for larger interests of national security or effectuation of socio-economic policies is still under extensive scrutiny. It is in this regard that we have compiled a number of sectoral legislations, regulating domains ranging from Finance and Telecom to Healthcare, Freedom of Expression, Consumer rights and Procedural codes. The highlighted provisions under each Act pertain to the mechanisms embodied within the legislation for the regulation of privacy within their respective sectors. Through this we aim to determine the threshold for permissible collection of confidential data and regulatory surveillance, provided a sufficient need for the same has been established. The determination of such a threshold is imperative to formulating a consistent and effective regime of privacy protection in India.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Click to download the below resources:&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Legislations&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/master-circulars.zip" class="external-link"&gt;Master Circulars&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/finance-and-privacy.zip" class="external-link"&gt;Finance and Privacy&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/cpc-crpc.zip" class="external-link"&gt;Code of Civil Procedure and Code of Criminal Procedure&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/freedom-of-expression.zip" class="external-link"&gt;Freedom of Expression&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/identity-and-privacy.zip" class="internal-link"&gt;Identity and Privacy&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/national-security-and-privacy.zip" class="internal-link"&gt;National Security and Privacy&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/consumer-protection-privacy.zip" class="external-link"&gt;Consumer Protection&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/transparency-and-privacy.zip" class="internal-link"&gt;Transparency and Privacy&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/healthcare.zip" class="external-link"&gt;Healthcare&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/telecom-chapters.zip" class="external-link"&gt;Telecom&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Case Laws&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/code-of-civil-procedure.zip" class="external-link"&gt;Code of Civil Procedure and Code of Criminal Procedure&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/freedom-expression.zip" class="internal-link"&gt;Freedom of Expression&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/identity-cases.zip" class="external-link"&gt;Identity and Privacy&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/national-security-cases.zip" class="external-link"&gt;National Security and Privacy&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/consumer-protection.zip" class="internal-link"&gt;Consumer Protection&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/transparency-privacy.zip" class="internal-link"&gt;Transparency and Privacy&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/health-care.zip" class="internal-link"&gt;Healthcare&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/telecom-cases.zip" class="internal-link"&gt;Telecom&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;ol&gt; &lt;/ol&gt; &lt;ol&gt; &lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-embodiment-of-right-to-privacy-within-domestic-legislation'&gt;https://cis-india.org/internet-governance/blog/the-embodiment-of-right-to-privacy-within-domestic-legislation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>tanvi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-09-08T02:37:39Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/-neutrality-free-speech-and-the-indian-constitution-part-2">
    <title>Net Neutrality, Free Speech and the Indian Constitution - II </title>
    <link>https://cis-india.org/internet-governance/blog/-neutrality-free-speech-and-the-indian-constitution-part-2</link>
    <description>
        &lt;b&gt;In this 3 part series, Gautam Bhatia explores the concept of net neutrality in the context of Indian law and the Indian Constitution.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;To sum up the &lt;a href="https://cis-india.org/internet-governance/blog/net-neutrality-free-speech-and-the-indian-constitution-part-1"&gt;previous post&lt;/a&gt;: under Article 12 of the Constitution, fundamental rights can be enforced only against the State, or State-like entities that are under the functional, financial and administrative control of the State. In the context of net neutrality, it is clear that privately-owned ISPs do not meet the exacting standards of Article 12. Nonetheless, we also found that the Indian Supreme Court has held private entities, which do not fall within the contours of Article 12, to an effectively similar standard of obligations under Part III as State organizations in certain cases. Most prominent among these is the case of education: private educational institutions have been required to adhere to standards of equal treatment which are identical in content to Article 14, even though their source lies elsewhere. If, therefore, we are to impose obligations of net neutrality upon private ISPs, a similar argument must be found.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I will suggest that the best hope is by invoking the free speech guarantee of Article 19(1)(a). To understand how an obligation of free speech might operate in this case, let us turn to the case of &lt;a href="http://scholar.google.com/scholar_case?case=7287882985401537921&amp;amp;hl=en&amp;amp;as_sdt=6&amp;amp;as_vis=1&amp;amp;oi=scholarr"&gt;&lt;i&gt;Marsh v. Alabama&lt;/i&gt;&lt;/a&gt;, an American Supreme Court case from 1946.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Marsh v. Alabama &lt;/i&gt;involved a “company town”. The “town” of Chickasaw was owned by a private company, the Gulf Shipbuilding Corporation. In its structure it resembled a regular township: it had building, streets, a sewage system, and a “business block”, where stores and business places had been rented out to merchants and other service providers. The residents of the “town” used the business block as their shopping center, to get to which they used the company-owned pavement and street. Highway traffic regularly came in through the town, and its facilities were used by wayfarers. As the Court noted:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“In short the town and its shopping district are accessible to and freely used by the public in general and there is nothing to distinguish them from any other town and shopping center except the fact that the title to the property belongs to a private corporation.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Marsh, who was a Jehovah’s Witness, arrived in Chickasaw with the intention of distributing religious literature on the streets. She was asked to leave the sidewalk, and on declining, she was arrested by the police, and charged under an anti-trespassing statute. She argued that if the statute was applied to her, it would violate her free speech and freedom of religion rights under the American First Amendment. The lower Courts rejected her argument, holding that since the street was owned by a private corporation, she had no constitutional free speech rights, and the situation was analogous to being invited into a person’s  private house. The Supreme Court, however, reversed the lower Courts, and found for Marsh.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Four (connected) strands of reasoning run through the Supreme Court’s (brief) opinion. &lt;i&gt;First&lt;/i&gt;, it found that streets, sidewalks and public places have historically been critically important sites for dissemination and reception of news, information and opinions, whether it is through distribution of literature, street-corner oratory, or whatever else. &lt;i&gt;Secondly&lt;/i&gt;, it found that private ownership did not carry with it a right to exclusive dominion. Rather, &lt;i&gt;“the owners of privately held bridges, ferries, turnpikes and railroads may not operate them as freely as a farmer does his farm. Since these facilities &lt;span&gt;are built and operated primarily to benefit the public and since their operation is essentially a public function&lt;/span&gt;, it is subject to state regulation.” Thirdly&lt;/i&gt;, it noted that a large number of Americans throughout the United States lived in company towns, and acted just as other American citizens did, in their duties as residents of a community. It would therefore be perverse to deny them rights enjoyed by those who lived in State-municipality run towns. And &lt;i&gt;fourthly&lt;/i&gt;, on balance, it held that the private rights of property-owners was subordinate to the right of the people to “&lt;i&gt;enjoy freedom of press and religion&lt;/i&gt;.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;No one factor, then, but a combination of factors underlie the Court’s decision to impose constitutional obligations upon a private party. It mattered that, historically, there have been a number of spaces traditionally dedicated to public speech: parks, squares and streets – whose &lt;i&gt;public character &lt;/i&gt;remained unchanged despite the nature of ownership. It mattered that individuals had no feasible exit option – that is, no other place they could go to in order to exercise their free speech rights. And it mattered that free speech occupied a significant enough place in the Constitutional scheme so as to override the exclusionary rights that normally tend to go with private property.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The case of the privately-owned street in the privately-owned town presents a striking analogy when we start thinking seriously about net neutrality. First of all, in the digital age, the traditional sites of public discourse – parks, town squares, streets – have been replaced by their digital equivalents. The lonely orator standing on the soap-box in the street corner now tweets his opinions and instagrams his photographs. The street-pamphleteer of yesteryear now updates his Facebook status to reflect his political opinions. Specialty and general-interest blogs constitute a multiplicity of town-squares where a speaker makes his point, and his hearers gather in the comments section to discuss and debate the issue. While these examples may seem frivolous at first blush, the basic point is a serious one: the role of opinion formation and transmission that once served by open, publicly accessible physical infrastructure, held – in a manner of speaking – in public trust by the government, is now served in the digital world, under the control of private gatekeepers. To that extent, it is a public function, undertaken in public interest, as the Court held in &lt;i&gt;Marsh v. Alabama&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The absence of an exit option is equally important. The internet has become not only &lt;i&gt;a &lt;/i&gt;space of exchanging information, but it has become a primary – non-replaceable source – of the same. Like the citizens of Chickasaw lacked a feasible alternative space to exercise their public free speech rights (and we operate on the assumption that it would be unreasonably expensive and disruptive for them to move to a different town), there is now no feasible alternative space to the internet, as it exists today, where the main online spaces are owned by private parties, and &lt;i&gt;access &lt;/i&gt;to those spaces is determined by gatekeepers – which are the ISPs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The analogy is not perfect, of course, but there is a case to be made that in acting as the gatekeepers of the internet, privately-owned ISPs are in a position quite similar to the corporate owners of they public streets Company Town.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the last post, we saw how it is possible – constitutionally – to impose public obligations upon private parties, although the Court has never made its jurisprudential foundation clear. Here, then, is a thought: public obligations ought to be imposed when the private entity is providing a public function and/or when the private entity is in effectively exclusive control of a public good. There is an argument that ISPs satisfy both conditions. Of course, we need to examine in detail how precisely the rights of free expression are implicated in the ISP context. That is the subject for the next post.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Gautam Bhatia — @gautambhatia88 on Twitter — is a graduate of the National Law School of India University (2011), and presently an LLM student at the Yale Law School.  He blogs about the Indian Constitution at &lt;a class="moz-txt-link-freetext" href="http://indconlawphil.wordpress.com"&gt;http://indconlawphil.wordpress.com&lt;/a&gt;. Here at CIS, he will be blogging on issues of online freedom of speech and expression.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/-neutrality-free-speech-and-the-indian-constitution-part-2'&gt;https://cis-india.org/internet-governance/blog/-neutrality-free-speech-and-the-indian-constitution-part-2&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>gautam</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-04-29T07:42:40Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/dna-amrita-madhukalya-april-26-2014-facebook-launches-fb-newswire-for-journalists-loses-part-of-its-immunity-under-it-act-2000">
    <title>Facebook launches FB Newswire for journalists; loses part of its immunity under IT Act 2000</title>
    <link>https://cis-india.org/news/dna-amrita-madhukalya-april-26-2014-facebook-launches-fb-newswire-for-journalists-loses-part-of-its-immunity-under-it-act-2000</link>
    <description>
        &lt;b&gt;A bus accident in California, a fire in New Jersey and another in Vasant Kunj, NASA's successful test flight of its vertical take-off and landing craft, a ceremony to honour the sherpas who died during an avalanche at the Everest last week, and, Israel's suspension of talks with Palestinian authorities. These were some of the news that were disseminated on the first day of Facebook's newest social tool: a newswire to aid journalists and newsrooms.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.dnaindia.com/india/report-facebook-launches-fb-newswire-for-journalists-loses-part-of-its-immunity-under-it-act-2000-1982198"&gt;published in DNA&lt;/a&gt; on April 26, 2014. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In a tie-up with News Corp's Storyful, Facebook launched the Newswire late on Thursday to function as a tool to aid journalists and newsrooms to "find, share and embed newsworthy content from Facebook in the media they produce". Apart from Facebook, the tool is also accessible on twitter at @FBNewswire.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"FB Newswire aggregates newsworthy content shared publicly on Facebook by individuals and organisations across the world for journalists to use in their reporting. This will include original photos, videos and status updates posted by people on the front lines of major events like protests, elections and sporting events," said Andy Mitchell, director of news and global media partnerships at Facebook, via a Facebook blog post.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook has been in the centre of the internet security debate for a while; claiming immunity from legal provisions citing its non-curatorial approach and also denying responsibility for the news the social media network produces. "With the launch of this new tool, Facebook is not only curating information, it also directs knowledge of the content its produces through the newswire. That makes it legally responsible under the Information Technology Act (2000)", says Sunil Abraham, director of the Centre for Internet and Society (CIS).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The move is also seen as Facebook attempting to reach out to journalists, and eat away into the space that Twitter has occupied in the dissemination of information. Facebook has largely been operating as a social media network; and its move into the new-making space is seen as an expansion in that direction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"There might be some competition for journalists and traditional media outlets. But largely, Facebook's tie-ups with broadcasters and political parties, where it has been promoting content in exchange for compensation, has not been transparent," says Abraham.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With more than a billion users, Facebook is considered the largest social media network. In a statement on April 24, Facebook revealed that more than half of the world's internet population now uses the social media network and recorded a 72% increase in its revenues in the first quarter of the year.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/dna-amrita-madhukalya-april-26-2014-facebook-launches-fb-newswire-for-journalists-loses-part-of-its-immunity-under-it-act-2000'&gt;https://cis-india.org/news/dna-amrita-madhukalya-april-26-2014-facebook-launches-fb-newswire-for-journalists-loses-part-of-its-immunity-under-it-act-2000&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Social Media</dc:subject>
    

   <dc:date>2014-05-06T05:41:03Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-times-of-india-april-25-indrani-bagchi-india-for-inclusive-internet-governance">
    <title>India for inclusive internet governance</title>
    <link>https://cis-india.org/news/the-times-of-india-april-25-indrani-bagchi-india-for-inclusive-internet-governance</link>
    <description>
        &lt;b&gt;India wants "core internet infrastructure" to be part of an international legal system that would accommodate governments, civil society and other stakeholders. In typical Indian diplomatic style, its position can be interpreted to mean everything and nothing. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Indrani Bagchi &lt;a class="external-link" href="http://timesofindia.indiatimes.com/india/India-for-inclusive-internet-governance/articleshow/34170534.cms"&gt;published in the Times of India&lt;/a&gt; on April 25, 2014 quotes Sunil Abraham.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;An MEA team, led by joint secretary Vinay Kwatra, told Net Mundial (forum for internet governance) in Brazil on Thursday, "The elements of India's approach on internet governance respond to its growing complexity and rests in supporting the dynamism, security and openness of a single and unfragmented cyberspace. We also support innovation and robust private sector investment to augment internet's continuing growth and evolution."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian position is essentially an MEA position, because there has been little prior inter-agency consultation in the government. In fact, while the MEA had decided upon its team almost a month ago, the department of information technology woke up only last week. It was on Friday that the nodal ministry for IT-related issues even agreed to send a team to Brazil on Monday- the same team that the MEA was sending. If nothing else, sources said, this only highlighted the lack of seriousness within the Indian system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kwatra said internet should have a democratic governing system involving everyone, which would essentially mean creating a parallel international system. While India does not want the status quo to continue, there is no clarity whether it favours a multilateral or a multi-stakeholder system. India, like China, wants a strong state presence in the decision-making process of internet governance because "it is used for transactions of core economic, civil and defence assets at national level and in the process, countries are placing their core national security interests in this medium". On the other hand, it wants unfettered access to knowledge and technology as a nation-building and governance tool.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, India wants non-governmental stakeholders to be properly audited and a "clear delineation of principles governing their participation, including their accountability, representativeness, transparency and inclusiveness". There is a crying need for India to clearly define the future it expects to thrive in.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abhraham of Bangalore-based Centre for Internet and Society says India should take the lead in defining new internet rules, keeping its future in mind. "We could use patent pools and compulsory licensing to provide affordable and innovative digital hardware to the developing world. This would ensure that rights-holders, innovators, manufactures, consumers and government would all benefit ... We could explore flat-fee licensing models like a broadband copyright cess or levy to ensure that users get content at affordable rates and rights-holders get some royalty from all internet users in India. This will go a long way in undermining the copyright enforcement-based censorship regime that has been established by the US. We could enact a world-class privacy law and establish an independent, autonomous and proactive privacy commissioner who will keep both private and state actors on a short lease. We need a scientific, targeted surveillance regime that is in compliance with human rights principles. This will make India simultaneously an IP and privacy haven and thereby attract huge investment from the private sector, and also earn the goodwill of the global civil society and independent media."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT" style="float:left; "&gt;This is more than the Indian government has thought of. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="float:left; "&gt;&lt;span id="advenueINTEXT" style="float:left; "&gt;While   no binding decisions are expected from Brazil this week, the high   profile event is expected to trigger a high-level debate on possible   reforms. India, say officials, needs to come up with concrete proposals.   This is imperative after the US made two crucial decisions on internet   governance this year. In March the US announced that by September 2015   it would give up oversight of the Internet Corporation for Assigned   Names and Numbers (ICANN), a California-based non-profit group, that   assigns domain names. But the US is clear it will not hand over the   levers to any organization that can be controlled by any other country.   This week, the US' FCC dealt a body blow to the concept of "net   neutrality" (which essentially functions on the premise that access to   the internet is the same for everyone) by allowing companies like Disney   and Google to pay for premium internet speeds. &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="float:left; "&gt;&lt;span style="float:left; "&gt;Countries like China, Russia, Saudi Arabia (may be even Iran) seek to control net access for their citizens as a measure of political control. Second, cyber offensive by countries which are ramping up capacity in these fields could take over internet governance structures if they are not crafted carefully enough. If the US is relinquishing control over ICANN, the next global battle is likely to be over who takes over that mantle. This makes it important to get net governance right. At least China has a plan: It wants the UN to take control. India wants a bit of everything, without actually giving it a shape, making it virtually impossible to shape the debate.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="float:left; "&gt;&lt;span style="float:left; "&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="float:left; "&gt;&lt;span style="float:left; "&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-times-of-india-april-25-indrani-bagchi-india-for-inclusive-internet-governance'&gt;https://cis-india.org/news/the-times-of-india-april-25-indrani-bagchi-india-for-inclusive-internet-governance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>NETmundial</dc:subject>
    

   <dc:date>2014-05-05T10:36:52Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
